Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-3389 (GCVE-0-2011-3389)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.878Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "74829",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/74829"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://eprint.iacr.org/2004/111"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635"
},
{
"name": "GLSA-201406-32",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "48692",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48692"
},
{
"name": "HPSBMU02799",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf"
},
{
"name": "SSRT100805",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"name": "55322",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/55322"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5130"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"name": "HPSBUX02730",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"name": "SUSE-SU-2012:0602",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"
},
{
"name": "1025997",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025997"
},
{
"name": "TA12-010A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html"
},
{
"name": "APPLE-SA-2011-10-12-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"name": "SUSE-SU-2012:0114",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
},
{
"name": "49388",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/49388"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://ekoparty.org/2011/juliano-rizzo.php"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"name": "RHSA-2013:1455",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "55351",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/55351"
},
{
"name": "SSRT100710",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"name": "VU#864643",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/864643"
},
{
"name": "APPLE-SA-2013-10-22-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "49778",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/49778"
},
{
"name": "DSA-2398",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2398"
},
{
"name": "48948",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48948"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT6150"
},
{
"name": "APPLE-SA-2012-02-01-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://technet.microsoft.com/security/advisory/2588513"
},
{
"name": "openSUSE-SU-2012:0063",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "https://hermes.opensuse.org/messages/13155432"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx"
},
{
"name": "RHSA-2011:1384",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/windows/1151/"
},
{
"name": "openSUSE-SU-2012:0030",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "https://hermes.opensuse.org/messages/13154861"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://eprint.iacr.org/2006/136"
},
{
"name": "48915",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48915"
},
{
"name": "GLSA-201203-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
},
{
"name": "SSRT100740",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html"
},
{
"name": "48256",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48256"
},
{
"name": "APPLE-SA-2012-09-19-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
},
{
"name": "1026103",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1026103"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4999"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5501"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.insecure.cl/Beast-SSL.rar"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5001"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/mac/1160/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://curl.haxx.se/docs/adv_20120124B.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/support/kb/view/1004/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"name": "1026704",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1026704"
},
{
"name": "APPLE-SA-2012-07-25-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html"
},
{
"name": "HPSBMU02742",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue"
},
{
"name": "RHSA-2012:0508",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html"
},
{
"name": "45791",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45791"
},
{
"name": "1029190",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1029190"
},
{
"name": "MDVSA-2012:058",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058"
},
{
"name": "47998",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/47998"
},
{
"name": "SSRT100867",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"name": "49198",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49198"
},
{
"name": "RHSA-2012:0006",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/windows/1160/"
},
{
"name": "SUSE-SU-2012:0122",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html"
},
{
"name": "HPSBUX02777",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"name": "oval:org.mitre.oval:def:14752",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/unix/1151/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/mac/1151/"
},
{
"name": "MS12-006",
"tags": [
"vendor-advisory",
"x_refsource_MS",
"x_transferred"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006"
},
{
"name": "HPSBUX02760",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/unix/1160/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "SSRT100854",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"name": "APPLE-SA-2011-10-12-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=719047"
},
{
"name": "HPSBMU02900",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://vnhacker.blogspot.com/2011/09/beast.html"
},
{
"name": "USN-1263-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1263-1"
},
{
"name": "APPLE-SA-2012-05-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "55350",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/55350"
},
{
"name": "HPSBMU02797",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
},
{
"name": "openSUSE-SU-2020:0086",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-05-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-01-21T21:06:36",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "74829",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/74829"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://eprint.iacr.org/2004/111"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635"
},
{
"name": "GLSA-201406-32",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "48692",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48692"
},
{
"name": "HPSBMU02799",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf"
},
{
"name": "SSRT100805",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"name": "55322",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/55322"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5130"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"name": "HPSBUX02730",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"name": "SUSE-SU-2012:0602",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"
},
{
"name": "1025997",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025997"
},
{
"name": "TA12-010A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html"
},
{
"name": "APPLE-SA-2011-10-12-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"name": "SUSE-SU-2012:0114",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
},
{
"name": "49388",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/49388"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://ekoparty.org/2011/juliano-rizzo.php"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"name": "RHSA-2013:1455",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "55351",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/55351"
},
{
"name": "SSRT100710",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"name": "VU#864643",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/864643"
},
{
"name": "APPLE-SA-2013-10-22-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "49778",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/49778"
},
{
"name": "DSA-2398",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2398"
},
{
"name": "48948",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48948"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT6150"
},
{
"name": "APPLE-SA-2012-02-01-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://technet.microsoft.com/security/advisory/2588513"
},
{
"name": "openSUSE-SU-2012:0063",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "https://hermes.opensuse.org/messages/13155432"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx"
},
{
"name": "RHSA-2011:1384",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/windows/1151/"
},
{
"name": "openSUSE-SU-2012:0030",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "https://hermes.opensuse.org/messages/13154861"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://eprint.iacr.org/2006/136"
},
{
"name": "48915",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48915"
},
{
"name": "GLSA-201203-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
},
{
"name": "SSRT100740",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html"
},
{
"name": "48256",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48256"
},
{
"name": "APPLE-SA-2012-09-19-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
},
{
"name": "1026103",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1026103"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4999"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5501"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.insecure.cl/Beast-SSL.rar"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5001"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/mac/1160/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://curl.haxx.se/docs/adv_20120124B.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/support/kb/view/1004/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"name": "1026704",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1026704"
},
{
"name": "APPLE-SA-2012-07-25-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html"
},
{
"name": "HPSBMU02742",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue"
},
{
"name": "RHSA-2012:0508",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html"
},
{
"name": "45791",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45791"
},
{
"name": "1029190",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1029190"
},
{
"name": "MDVSA-2012:058",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058"
},
{
"name": "47998",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/47998"
},
{
"name": "SSRT100867",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"name": "49198",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49198"
},
{
"name": "RHSA-2012:0006",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/windows/1160/"
},
{
"name": "SUSE-SU-2012:0122",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html"
},
{
"name": "HPSBUX02777",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"name": "oval:org.mitre.oval:def:14752",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/unix/1151/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/mac/1151/"
},
{
"name": "MS12-006",
"tags": [
"vendor-advisory",
"x_refsource_MS"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006"
},
{
"name": "HPSBUX02760",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/unix/1160/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "SSRT100854",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"name": "APPLE-SA-2011-10-12-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=719047"
},
{
"name": "HPSBMU02900",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://vnhacker.blogspot.com/2011/09/beast.html"
},
{
"name": "USN-1263-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1263-1"
},
{
"name": "APPLE-SA-2012-05-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "55350",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/55350"
},
{
"name": "HPSBMU02797",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
},
{
"name": "openSUSE-SU-2020:0086",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3389",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "74829",
"refsource": "OSVDB",
"url": "http://osvdb.org/74829"
},
{
"name": "http://eprint.iacr.org/2004/111",
"refsource": "MISC",
"url": "http://eprint.iacr.org/2004/111"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635",
"refsource": "MISC",
"url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635"
},
{
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "48692",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48692"
},
{
"name": "HPSBMU02799",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"name": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf",
"refsource": "CONFIRM",
"url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf"
},
{
"name": "SSRT100805",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"name": "55322",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55322"
},
{
"name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5130"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=737506",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"name": "HPSBUX02730",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"name": "SUSE-SU-2012:0602",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"
},
{
"name": "1025997",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025997"
},
{
"name": "TA12-010A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html"
},
{
"name": "APPLE-SA-2011-10-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"name": "SUSE-SU-2012:0114",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
},
{
"name": "49388",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49388"
},
{
"name": "http://ekoparty.org/2011/juliano-rizzo.php",
"refsource": "MISC",
"url": "http://ekoparty.org/2011/juliano-rizzo.php"
},
{
"name": "http://downloads.asterisk.org/pub/security/AST-2016-001.html",
"refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html"
},
{
"name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail",
"refsource": "CONFIRM",
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "55351",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55351"
},
{
"name": "SSRT100710",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"name": "VU#864643",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/864643"
},
{
"name": "APPLE-SA-2013-10-22-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "49778",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49778"
},
{
"name": "DSA-2398",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2398"
},
{
"name": "48948",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48948"
},
{
"name": "http://support.apple.com/kb/HT6150",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6150"
},
{
"name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "http://technet.microsoft.com/security/advisory/2588513",
"refsource": "CONFIRM",
"url": "http://technet.microsoft.com/security/advisory/2588513"
},
{
"name": "openSUSE-SU-2012:0063",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/13155432"
},
{
"name": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx"
},
{
"name": "RHSA-2011:1384",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1151/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1151/"
},
{
"name": "openSUSE-SU-2012:0030",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/13154861"
},
{
"name": "http://eprint.iacr.org/2006/136",
"refsource": "MISC",
"url": "http://eprint.iacr.org/2006/136"
},
{
"name": "48915",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48915"
},
{
"name": "GLSA-201203-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
},
{
"name": "SSRT100740",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"name": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html",
"refsource": "MISC",
"url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html"
},
{
"name": "48256",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48256"
},
{
"name": "APPLE-SA-2012-09-19-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
},
{
"name": "1026103",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026103"
},
{
"name": "http://support.apple.com/kb/HT4999",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4999"
},
{
"name": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html",
"refsource": "CONFIRM",
"url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html"
},
{
"name": "http://support.apple.com/kb/HT5501",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5501"
},
{
"name": "http://www.insecure.cl/Beast-SSL.rar",
"refsource": "MISC",
"url": "http://www.insecure.cl/Beast-SSL.rar"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02"
},
{
"name": "http://support.apple.com/kb/HT5001",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5001"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/1160/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/1160/"
},
{
"name": "http://curl.haxx.se/docs/adv_20120124B.html",
"refsource": "CONFIRM",
"url": "http://curl.haxx.se/docs/adv_20120124B.html"
},
{
"name": "http://www.opera.com/support/kb/view/1004/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/support/kb/view/1004/"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"name": "1026704",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026704"
},
{
"name": "APPLE-SA-2012-07-25-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html"
},
{
"name": "HPSBMU02742",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"name": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue",
"refsource": "CONFIRM",
"url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue"
},
{
"name": "RHSA-2012:0508",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html"
},
{
"name": "45791",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45791"
},
{
"name": "1029190",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029190"
},
{
"name": "MDVSA-2012:058",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058"
},
{
"name": "47998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47998"
},
{
"name": "SSRT100867",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"name": "49198",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49198"
},
{
"name": "RHSA-2012:0006",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html"
},
{
"name": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/",
"refsource": "CONFIRM",
"url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1160/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1160/"
},
{
"name": "SUSE-SU-2012:0122",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html"
},
{
"name": "HPSBUX02777",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"name": "oval:org.mitre.oval:def:14752",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/1151/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/unix/1151/"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/1151/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/1151/"
},
{
"name": "MS12-006",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006"
},
{
"name": "HPSBUX02760",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/1160/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/unix/1160/"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"name": "http://support.apple.com/kb/HT5281",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "SSRT100854",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"name": "APPLE-SA-2011-10-12-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=719047",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=719047"
},
{
"name": "HPSBMU02900",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"name": "http://vnhacker.blogspot.com/2011/09/beast.html",
"refsource": "MISC",
"url": "http://vnhacker.blogspot.com/2011/09/beast.html"
},
{
"name": "USN-1263-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1263-1"
},
{
"name": "APPLE-SA-2012-05-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "55350",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55350"
},
{
"name": "HPSBMU02797",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"name": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
},
{
"name": "openSUSE-SU-2020:0086",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-3389",
"datePublished": "2011-09-06T19:00:00",
"dateReserved": "2011-09-05T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.878Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2011-3389\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-09-06T19:55:03.197\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \\\"BEAST\\\" attack.\"},{\"lang\":\"es\",\"value\":\"El protocolo SSL, como se utiliza en ciertas configuraciones en Microsoft Windows y Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera y otros productos, cifra los datos mediante el uso del modo CBC con vectores de inicializaci\u00f3n encadenados, lo que permite a atacantes man-in-the-middle obtener cabeceras HTTP en texto plano a trav\u00e9s de un ataque blockwise chosen-boundary (BCBA) en una sesi\u00f3n HTTPS, junto con el c\u00f3digo de JavaScript que usa (1) la API WebSocket HTML5, (2) la API Java URLConnection o (3) la API Silverlight WebClient, tambi\u00e9n conocido como un ataque \\\"BEAST\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39B565E1-C2F1-44FC-A517-E3130332B17C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C37BA825-679F-4257-9F2B-CE2318B75396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D4FFCF-5309-43B6-9FD5-680C6D535A7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4545786D-3129-4D92-B218-F4A92428ED48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_rf68xr_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.1\",\"matchCriteriaId\":\"416A895C-F973-4C13-AB9B-32D56B32C14B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_rf68xr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB562D2A-9B77-42DD-A49B-F5E909E69589\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_rf615r_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.1\",\"matchCriteriaId\":\"46F9E136-5346-4761-A60B-1A1F12DD75BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_rf615r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2310C8A4-DFE4-44E4-B840-2FF1744F785D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.10.6\",\"versionEndIncluding\":\"7.23.1\",\"matchCriteriaId\":\"5320D044-368E-450B-B658-E861ABECA82C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0554C89-3716-49F3-BFAE-E008D5E4E29C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6D0378-F0F4-4AAA-80AF-8287C790EC96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87614B58-24AB-49FB-9C84-E8DDBA16353B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF49D26F-142E-468B-87C1-BABEA445255C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4174F4F-149E-41A6-BBCC-D01114C05F38\"}]}]}],\"references\":[{\"url\":\"http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://curl.haxx.se/docs/adv_20120124B.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2016-001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://ekoparty.org/2011/juliano-rizzo.php\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://eprint.iacr.org/2004/111\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://eprint.iacr.org/2006/136\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://isc.sans.edu/diary/SSL+TLS+part+3+/11635\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://osvdb.org/74829\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0508.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1455.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/45791\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/47998\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48256\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48692\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48915\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48948\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/49198\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55322\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55350\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55351\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201203-02.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4999\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5001\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5130\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5281\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT5501\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT6150\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://technet.microsoft.com/security/advisory/2588513\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://vnhacker.blogspot.com/2011/09/beast.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2398\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ibm.com/developerworks/java/jdk/alerts/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.imperialviolet.org/2011/09/23/chromeandbeast.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.insecure.cl/Beast-SSL.rar\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Patch\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/864643\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:058\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.opera.com/docs/changelogs/mac/1151/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/mac/1160/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/unix/1151/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/unix/1160/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/windows/1151/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/windows/1160/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/support/kb/view/1004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1384.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2012-0006.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/49388\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/49778\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1029190\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1025997\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1026103\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1026704\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1263-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA12-010A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=719047\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=737506\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hermes.opensuse.org/messages/13154861\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hermes.opensuse.org/messages/13155432\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://curl.haxx.se/docs/adv_20120124B.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2016-001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://ekoparty.org/2011/juliano-rizzo.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://eprint.iacr.org/2004/111\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://eprint.iacr.org/2006/136\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://isc.sans.edu/diary/SSL+TLS+part+3+/11635\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://osvdb.org/74829\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0508.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1455.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/45791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/47998\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48692\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48948\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/49198\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55322\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55350\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55351\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201203-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4999\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5281\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT5501\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT6150\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://technet.microsoft.com/security/advisory/2588513\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://vnhacker.blogspot.com/2011/09/beast.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2398\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ibm.com/developerworks/java/jdk/alerts/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.imperialviolet.org/2011/09/23/chromeandbeast.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.insecure.cl/Beast-SSL.rar\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/864643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:058\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.opera.com/docs/changelogs/mac/1151/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/mac/1160/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/unix/1151/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/unix/1160/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/windows/1151/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/windows/1160/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/support/kb/view/1004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1384.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2012-0006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/49388\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/49778\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1029190\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1025997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1026103\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1026704\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1263-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA12-010A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=719047\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=737506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hermes.opensuse.org/messages/13154861\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hermes.opensuse.org/messages/13155432\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
RHSA-2011:1380
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nA flaw was found in the Java RMI (Remote Method Invocation) registry\nimplementation. A remote RMI client could use this flaw to execute\narbitrary code on the RMI server running the registry. (CVE-2011-3556)\n\nA flaw was found in the Java RMI registry implementation. A remote RMI\nclient could use this flaw to execute code on the RMI server with\nunrestricted privileges. (CVE-2011-3557)\n\nA flaw was found in the IIOP (Internet Inter-Orb Protocol) deserialization\ncode. An untrusted Java application or applet running in a sandbox could\nuse this flaw to bypass sandbox restrictions by deserializing\nspecially-crafted input. (CVE-2011-3521)\n\nIt was found that the Java ScriptingEngine did not properly restrict the\nprivileges of sandboxed applications. An untrusted Java application or\napplet running in a sandbox could use this flaw to bypass sandbox\nrestrictions. (CVE-2011-3544)\n\nA flaw was found in the AWTKeyStroke implementation. An untrusted Java\napplication or applet running in a sandbox could use this flaw to bypass\nsandbox restrictions. (CVE-2011-3548)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the Java2D code used to perform transformations of graphic shapes\nand images. An untrusted Java application or applet running in a sandbox\ncould use this flaw to bypass sandbox restrictions. (CVE-2011-3551)\n\nAn insufficient error checking flaw was found in the unpacker for JAR files\nin pack200 format. A specially-crafted JAR file could use this flaw to\ncrash the Java Virtual Machine (JVM) or, possibly, execute arbitrary code\nwith JVM privileges. (CVE-2011-3554)\n\nIt was found that HttpsURLConnection did not perform SecurityManager checks\nin the setSSLSocketFactory method. An untrusted Java application or applet\nrunning in a sandbox could use this flaw to bypass connection restrictions\ndefined in the policy. (CVE-2011-3560)\n\nA flaw was found in the way the SSL 3 and TLS 1.0 protocols used block\nciphers in cipher-block chaining (CBC) mode. An attacker able to perform a\nchosen plain text attack against a connection mixing trusted and untrusted\ndata could use this flaw to recover portions of the trusted data sent over\nthe connection. (CVE-2011-3389)\n\nNote: This update mitigates the CVE-2011-3389 issue by splitting the first\napplication data record byte to a separate SSL/TLS protocol record. This\nmitigation may cause compatibility issues with some SSL/TLS implementations\nand can be disabled using the jsse.enableCBCProtection boolean property.\nThis can be done on the command line by appending the flag\n\"-Djsse.enableCBCProtection=false\" to the java command.\n\nAn information leak flaw was found in the InputStream.skip implementation.\nAn untrusted Java application or applet could possibly use this flaw to\nobtain bytes skipped by other threads. (CVE-2011-3547)\n\nA flaw was found in the Java HotSpot virtual machine. An untrusted Java\napplication or applet could use this flaw to disclose portions of the VM\nmemory, or cause it to crash. (CVE-2011-3558)\n\nThe Java API for XML Web Services (JAX-WS) implementation in OpenJDK was\nconfigured to include the stack trace in error messages sent to clients. A\nremote client could possibly use this flaw to obtain sensitive information.\n(CVE-2011-3553)\n\nIt was found that Java applications running with SecurityManager\nrestrictions were allowed to use too many UDP sockets by default. If\nmultiple instances of a malicious application were started at the same\ntime, they could exhaust all available UDP sockets on the system.\n(CVE-2011-3552)\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.9.10. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1380",
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS",
"url": "http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1380.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-openjdk security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:14+00:00",
"generator": {
"date": "2025-09-26T03:12:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2011:1380",
"initial_release_date": "2011-10-18T23:19:00+00:00",
"revision_history": [
{
"date": "2011-10-18T23:19:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-10-18T19:26:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3558",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745492"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3558"
},
{
"category": "external",
"summary": "RHBZ#745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
}
]
}
RHSA-2012:0006
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.4.2-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise\nLinux 5 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM Java SE version 1.4.2 release includes the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3545,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560)\n\nAll users of java-1.4.2-ibm are advised to upgrade to these updated\npackages, which contain the IBM Java 1.4.2 SR13-FP11 release. All running\ninstances of IBM Java must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0006",
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0006.json"
}
],
"title": "Red Hat Security Advisory: java-1.4.2-ibm security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:17+00:00",
"generator": {
"date": "2025-09-26T03:12:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2012:0006",
"initial_release_date": "2012-01-09T20:03:00+00:00",
"revision_history": [
{
"date": "2012-01-09T20:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-01-09T20:07:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
}
]
}
rhsa-2012:0508
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3557,\nCVE-2011-3560, CVE-2011-3563, CVE-2012-0498, CVE-2012-0499, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507)\n\nAll users of java-1.5.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.5.0 SR13-FP1 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0508",
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0508.json"
}
],
"title": "Red Hat Security Advisory: java-1.5.0-ibm security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:21+00:00",
"generator": {
"date": "2025-09-26T03:12:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2012:0508",
"initial_release_date": "2012-04-23T16:52:00+00:00",
"revision_history": [
{
"date": "2012-04-23T16:52:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-11-14T19:09:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3563",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789295"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3563"
},
{
"category": "external",
"summary": "RHBZ#789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)"
},
{
"cve": "CVE-2012-0498",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790720"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0498"
},
{
"category": "external",
"summary": "RHBZ#790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0498"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0499",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790722"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0499"
},
{
"category": "external",
"summary": "RHBZ#790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0501",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788624"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0501"
},
{
"category": "external",
"summary": "RHBZ#788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)"
},
{
"cve": "CVE-2012-0502",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789297"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0502"
},
{
"category": "external",
"summary": "RHBZ#789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)"
},
{
"cve": "CVE-2012-0503",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788976"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0503"
},
{
"category": "external",
"summary": "RHBZ#788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)"
},
{
"cve": "CVE-2012-0505",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789299"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0505"
},
{
"category": "external",
"summary": "RHBZ#789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)"
},
{
"cve": "CVE-2012-0506",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789300"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0506"
},
{
"category": "external",
"summary": "RHBZ#789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)"
},
{
"cve": "CVE-2012-0507",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788994"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0507"
},
{
"category": "external",
"summary": "RHBZ#788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0507"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)"
}
]
}
rhsa-2012_0508
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3557,\nCVE-2011-3560, CVE-2011-3563, CVE-2012-0498, CVE-2012-0499, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507)\n\nAll users of java-1.5.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.5.0 SR13-FP1 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0508",
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0508.json"
}
],
"title": "Red Hat Security Advisory: java-1.5.0-ibm security update",
"tracking": {
"current_release_date": "2024-11-14T11:30:58+00:00",
"generator": {
"date": "2024-11-14T11:30:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2012:0508",
"initial_release_date": "2012-04-23T16:52:00+00:00",
"revision_history": [
{
"date": "2012-04-23T16:52:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-11-14T19:09:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T11:30:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3563",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789295"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3563"
},
{
"category": "external",
"summary": "RHBZ#789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)"
},
{
"cve": "CVE-2012-0498",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790720"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0498"
},
{
"category": "external",
"summary": "RHBZ#790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0498"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0499",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790722"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0499"
},
{
"category": "external",
"summary": "RHBZ#790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0501",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788624"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0501"
},
{
"category": "external",
"summary": "RHBZ#788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)"
},
{
"cve": "CVE-2012-0502",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789297"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0502"
},
{
"category": "external",
"summary": "RHBZ#789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)"
},
{
"cve": "CVE-2012-0503",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788976"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0503"
},
{
"category": "external",
"summary": "RHBZ#788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)"
},
{
"cve": "CVE-2012-0505",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789299"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0505"
},
{
"category": "external",
"summary": "RHBZ#789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)"
},
{
"cve": "CVE-2012-0506",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789300"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0506"
},
{
"category": "external",
"summary": "RHBZ#789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)"
},
{
"cve": "CVE-2012-0507",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788994"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0507"
},
{
"category": "external",
"summary": "RHBZ#788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0507"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)"
}
]
}
rhsa-2012_0006
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.4.2-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise\nLinux 5 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM Java SE version 1.4.2 release includes the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3545,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560)\n\nAll users of java-1.4.2-ibm are advised to upgrade to these updated\npackages, which contain the IBM Java 1.4.2 SR13-FP11 release. All running\ninstances of IBM Java must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0006",
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0006.json"
}
],
"title": "Red Hat Security Advisory: java-1.4.2-ibm security update",
"tracking": {
"current_release_date": "2024-11-14T11:30:04+00:00",
"generator": {
"date": "2024-11-14T11:30:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2012:0006",
"initial_release_date": "2012-01-09T20:03:00+00:00",
"revision_history": [
{
"date": "2012-01-09T20:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-01-09T20:07:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T11:30:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
}
]
}
rhsa-2011_1384
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-sun packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch page, listed in the References section. (CVE-2011-3389,\nCVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551,\nCVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3555, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3558, CVE-2011-3560, CVE-2011-3561)\n\nAll users of java-1.6.0-sun are advised to upgrade to these updated\npackages, which provide JDK and JRE 6 Update 29 and resolve these issues.\nAll running instances of Sun Java must be restarted for the update to take\neffect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1384",
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "747206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747206"
},
{
"category": "external",
"summary": "747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1384.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-sun security update",
"tracking": {
"current_release_date": "2024-11-14T11:30:20+00:00",
"generator": {
"date": "2024-11-14T11:30:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2011:1384",
"initial_release_date": "2011-10-19T17:17:00+00:00",
"revision_history": [
{
"date": "2011-10-19T17:17:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-10-19T13:22:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T11:30:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3516",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747203"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3516"
},
{
"category": "external",
"summary": "RHBZ#747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3546",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747205"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3546"
},
{
"category": "external",
"summary": "RHBZ#747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3550",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747200"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3550"
},
{
"category": "external",
"summary": "RHBZ#747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3558",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745492"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3558"
},
{
"category": "external",
"summary": "RHBZ#745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3561",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747208"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3561"
},
{
"category": "external",
"summary": "RHBZ#747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
}
]
}
rhsa-2011:1380
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nA flaw was found in the Java RMI (Remote Method Invocation) registry\nimplementation. A remote RMI client could use this flaw to execute\narbitrary code on the RMI server running the registry. (CVE-2011-3556)\n\nA flaw was found in the Java RMI registry implementation. A remote RMI\nclient could use this flaw to execute code on the RMI server with\nunrestricted privileges. (CVE-2011-3557)\n\nA flaw was found in the IIOP (Internet Inter-Orb Protocol) deserialization\ncode. An untrusted Java application or applet running in a sandbox could\nuse this flaw to bypass sandbox restrictions by deserializing\nspecially-crafted input. (CVE-2011-3521)\n\nIt was found that the Java ScriptingEngine did not properly restrict the\nprivileges of sandboxed applications. An untrusted Java application or\napplet running in a sandbox could use this flaw to bypass sandbox\nrestrictions. (CVE-2011-3544)\n\nA flaw was found in the AWTKeyStroke implementation. An untrusted Java\napplication or applet running in a sandbox could use this flaw to bypass\nsandbox restrictions. (CVE-2011-3548)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the Java2D code used to perform transformations of graphic shapes\nand images. An untrusted Java application or applet running in a sandbox\ncould use this flaw to bypass sandbox restrictions. (CVE-2011-3551)\n\nAn insufficient error checking flaw was found in the unpacker for JAR files\nin pack200 format. A specially-crafted JAR file could use this flaw to\ncrash the Java Virtual Machine (JVM) or, possibly, execute arbitrary code\nwith JVM privileges. (CVE-2011-3554)\n\nIt was found that HttpsURLConnection did not perform SecurityManager checks\nin the setSSLSocketFactory method. An untrusted Java application or applet\nrunning in a sandbox could use this flaw to bypass connection restrictions\ndefined in the policy. (CVE-2011-3560)\n\nA flaw was found in the way the SSL 3 and TLS 1.0 protocols used block\nciphers in cipher-block chaining (CBC) mode. An attacker able to perform a\nchosen plain text attack against a connection mixing trusted and untrusted\ndata could use this flaw to recover portions of the trusted data sent over\nthe connection. (CVE-2011-3389)\n\nNote: This update mitigates the CVE-2011-3389 issue by splitting the first\napplication data record byte to a separate SSL/TLS protocol record. This\nmitigation may cause compatibility issues with some SSL/TLS implementations\nand can be disabled using the jsse.enableCBCProtection boolean property.\nThis can be done on the command line by appending the flag\n\"-Djsse.enableCBCProtection=false\" to the java command.\n\nAn information leak flaw was found in the InputStream.skip implementation.\nAn untrusted Java application or applet could possibly use this flaw to\nobtain bytes skipped by other threads. (CVE-2011-3547)\n\nA flaw was found in the Java HotSpot virtual machine. An untrusted Java\napplication or applet could use this flaw to disclose portions of the VM\nmemory, or cause it to crash. (CVE-2011-3558)\n\nThe Java API for XML Web Services (JAX-WS) implementation in OpenJDK was\nconfigured to include the stack trace in error messages sent to clients. A\nremote client could possibly use this flaw to obtain sensitive information.\n(CVE-2011-3553)\n\nIt was found that Java applications running with SecurityManager\nrestrictions were allowed to use too many UDP sockets by default. If\nmultiple instances of a malicious application were started at the same\ntime, they could exhaust all available UDP sockets on the system.\n(CVE-2011-3552)\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.9.10. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1380",
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS",
"url": "http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1380.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-openjdk security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:14+00:00",
"generator": {
"date": "2025-09-26T03:12:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2011:1380",
"initial_release_date": "2011-10-18T23:19:00+00:00",
"revision_history": [
{
"date": "2011-10-18T23:19:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-10-18T19:26:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3558",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745492"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3558"
},
{
"category": "external",
"summary": "RHBZ#745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
}
]
}
RHSA-2012:0034
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM Java SE version 6 release includes the IBM Java 6 Runtime\nEnvironment and the IBM Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 6 Runtime\nEnvironment and the IBM Java 6 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3516,\nCVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546, CVE-2011-3547,\nCVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551, CVE-2011-3552,\nCVE-2011-3553, CVE-2011-3554, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560,\nCVE-2011-3561)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM Java 6 SR10 release. All running instances\nof IBM Java must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0034",
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0034.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-ibm security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:17+00:00",
"generator": {
"date": "2025-09-26T03:12:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2012:0034",
"initial_release_date": "2012-01-18T19:22:00+00:00",
"revision_history": [
{
"date": "2012-01-18T19:22:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-01-18T19:24:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3516",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747203"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3516"
},
{
"category": "external",
"summary": "RHBZ#747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3546",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747205"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3546"
},
{
"category": "external",
"summary": "RHBZ#747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3550",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747200"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3550"
},
{
"category": "external",
"summary": "RHBZ#747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3561",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747208"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3561"
},
{
"category": "external",
"summary": "RHBZ#747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
}
]
}
RHSA-2011:1384
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-sun packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch page, listed in the References section. (CVE-2011-3389,\nCVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551,\nCVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3555, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3558, CVE-2011-3560, CVE-2011-3561)\n\nAll users of java-1.6.0-sun are advised to upgrade to these updated\npackages, which provide JDK and JRE 6 Update 29 and resolve these issues.\nAll running instances of Sun Java must be restarted for the update to take\neffect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1384",
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "747206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747206"
},
{
"category": "external",
"summary": "747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1384.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-sun security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:15+00:00",
"generator": {
"date": "2025-09-26T03:12:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2011:1384",
"initial_release_date": "2011-10-19T17:17:00+00:00",
"revision_history": [
{
"date": "2011-10-19T17:17:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-10-19T13:22:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3516",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747203"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3516"
},
{
"category": "external",
"summary": "RHBZ#747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3546",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747205"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3546"
},
{
"category": "external",
"summary": "RHBZ#747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3550",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747200"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3550"
},
{
"category": "external",
"summary": "RHBZ#747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3558",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745492"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3558"
},
{
"category": "external",
"summary": "RHBZ#745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3561",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747208"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3561"
},
{
"category": "external",
"summary": "RHBZ#747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
}
]
}
rhsa-2011:1384
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-sun packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch page, listed in the References section. (CVE-2011-3389,\nCVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551,\nCVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3555, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3558, CVE-2011-3560, CVE-2011-3561)\n\nAll users of java-1.6.0-sun are advised to upgrade to these updated\npackages, which provide JDK and JRE 6 Update 29 and resolve these issues.\nAll running instances of Sun Java must be restarted for the update to take\neffect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1384",
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "747206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747206"
},
{
"category": "external",
"summary": "747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1384.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-sun security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:15+00:00",
"generator": {
"date": "2025-09-26T03:12:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2011:1384",
"initial_release_date": "2011-10-19T17:17:00+00:00",
"revision_history": [
{
"date": "2011-10-19T17:17:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-10-19T13:22:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3516",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747203"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3516"
},
{
"category": "external",
"summary": "RHBZ#747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3546",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747205"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3546"
},
{
"category": "external",
"summary": "RHBZ#747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3550",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747200"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3550"
},
{
"category": "external",
"summary": "RHBZ#747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3558",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745492"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3558"
},
{
"category": "external",
"summary": "RHBZ#745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3561",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747208"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3561"
},
{
"category": "external",
"summary": "RHBZ#747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-19T17:17:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1384"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686",
"6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
}
]
}
rhsa-2012_0343
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.4.2-ibm-sap packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 4, 5 and 6 for SAP.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.4.2 SR13-FP11 Java release includes the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3545,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560)\n\nAll users of java-1.4.2-ibm-sap are advised to upgrade to these updated\npackages, which contain the IBM 1.4.2 SR13-FP11 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0343",
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0343.json"
}
],
"title": "Red Hat Security Advisory: java-1.4.2-ibm-sap security update",
"tracking": {
"current_release_date": "2024-11-14T11:30:46+00:00",
"generator": {
"date": "2024-11-14T11:30:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2012:0343",
"initial_release_date": "2012-02-29T14:46:00+00:00",
"revision_history": [
{
"date": "2012-02-29T14:46:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-02-29T14:46:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T11:30:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 4 AS for SAP",
"product": {
"name": "RHEL 4 AS for SAP",
"product_id": "4AS-SAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_sap:4"
}
}
},
{
"category": "product_name",
"name": "RHEL 5 Server for SAP",
"product": {
"name": "RHEL 5 Server for SAP",
"product_id": "5Server-SAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_sap:5"
}
}
}
],
"category": "product_family",
"name": "RHEL for SAP"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
}
]
}
rhsa-2012_0034
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM Java SE version 6 release includes the IBM Java 6 Runtime\nEnvironment and the IBM Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 6 Runtime\nEnvironment and the IBM Java 6 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3516,\nCVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546, CVE-2011-3547,\nCVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551, CVE-2011-3552,\nCVE-2011-3553, CVE-2011-3554, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560,\nCVE-2011-3561)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM Java 6 SR10 release. All running instances\nof IBM Java must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0034",
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0034.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-ibm security update",
"tracking": {
"current_release_date": "2024-11-14T11:30:15+00:00",
"generator": {
"date": "2024-11-14T11:30:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2012:0034",
"initial_release_date": "2012-01-18T19:22:00+00:00",
"revision_history": [
{
"date": "2012-01-18T19:22:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-01-18T19:24:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T11:30:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3516",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747203"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3516"
},
{
"category": "external",
"summary": "RHBZ#747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3546",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747205"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3546"
},
{
"category": "external",
"summary": "RHBZ#747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3550",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747200"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3550"
},
{
"category": "external",
"summary": "RHBZ#747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3561",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747208"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3561"
},
{
"category": "external",
"summary": "RHBZ#747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
}
]
}
rhsa-2012:0343
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.4.2-ibm-sap packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 4, 5 and 6 for SAP.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.4.2 SR13-FP11 Java release includes the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3545,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560)\n\nAll users of java-1.4.2-ibm-sap are advised to upgrade to these updated\npackages, which contain the IBM 1.4.2 SR13-FP11 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0343",
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0343.json"
}
],
"title": "Red Hat Security Advisory: java-1.4.2-ibm-sap security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:19+00:00",
"generator": {
"date": "2025-09-26T03:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2012:0343",
"initial_release_date": "2012-02-29T14:46:00+00:00",
"revision_history": [
{
"date": "2012-02-29T14:46:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-02-29T14:46:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 4 AS for SAP",
"product": {
"name": "RHEL 4 AS for SAP",
"product_id": "4AS-SAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_sap:4"
}
}
},
{
"category": "product_name",
"name": "RHEL 5 Server for SAP",
"product": {
"name": "RHEL 5 Server for SAP",
"product_id": "5Server-SAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_sap:5"
}
}
}
],
"category": "product_family",
"name": "RHEL for SAP"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
}
]
}
rhsa-2012:0034
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM Java SE version 6 release includes the IBM Java 6 Runtime\nEnvironment and the IBM Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 6 Runtime\nEnvironment and the IBM Java 6 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3516,\nCVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546, CVE-2011-3547,\nCVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551, CVE-2011-3552,\nCVE-2011-3553, CVE-2011-3554, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560,\nCVE-2011-3561)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM Java 6 SR10 release. All running instances\nof IBM Java must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0034",
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0034.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-ibm security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:17+00:00",
"generator": {
"date": "2025-09-26T03:12:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2012:0034",
"initial_release_date": "2012-01-18T19:22:00+00:00",
"revision_history": [
{
"date": "2012-01-18T19:22:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-01-18T19:24:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"relates_to_product_reference": "6Workstation-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3516",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747203"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3516"
},
{
"category": "external",
"summary": "RHBZ#747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3546",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747205"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3546"
},
{
"category": "external",
"summary": "RHBZ#747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3550",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747200"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3550"
},
{
"category": "external",
"summary": "RHBZ#747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3561",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747208"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3561"
},
{
"category": "external",
"summary": "RHBZ#747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-18T19:22:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0034"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x",
"6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
}
]
}
RHSA-2012:0343
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.4.2-ibm-sap packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 4, 5 and 6 for SAP.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.4.2 SR13-FP11 Java release includes the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3545,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560)\n\nAll users of java-1.4.2-ibm-sap are advised to upgrade to these updated\npackages, which contain the IBM 1.4.2 SR13-FP11 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0343",
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0343.json"
}
],
"title": "Red Hat Security Advisory: java-1.4.2-ibm-sap security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:19+00:00",
"generator": {
"date": "2025-09-26T03:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2012:0343",
"initial_release_date": "2012-02-29T14:46:00+00:00",
"revision_history": [
{
"date": "2012-02-29T14:46:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-02-29T14:46:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 4 AS for SAP",
"product": {
"name": "RHEL 4 AS for SAP",
"product_id": "4AS-SAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_sap:4"
}
}
},
{
"category": "product_name",
"name": "RHEL 5 Server for SAP",
"product": {
"name": "RHEL 5 Server for SAP",
"product_id": "5Server-SAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_sap:5"
}
}
}
],
"category": "product_family",
"name": "RHEL for SAP"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP",
"product_id": "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP",
"product_id": "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-SAP"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-02-29T14:46:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64",
"5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
}
]
}
rhsa-2011_1380
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nA flaw was found in the Java RMI (Remote Method Invocation) registry\nimplementation. A remote RMI client could use this flaw to execute\narbitrary code on the RMI server running the registry. (CVE-2011-3556)\n\nA flaw was found in the Java RMI registry implementation. A remote RMI\nclient could use this flaw to execute code on the RMI server with\nunrestricted privileges. (CVE-2011-3557)\n\nA flaw was found in the IIOP (Internet Inter-Orb Protocol) deserialization\ncode. An untrusted Java application or applet running in a sandbox could\nuse this flaw to bypass sandbox restrictions by deserializing\nspecially-crafted input. (CVE-2011-3521)\n\nIt was found that the Java ScriptingEngine did not properly restrict the\nprivileges of sandboxed applications. An untrusted Java application or\napplet running in a sandbox could use this flaw to bypass sandbox\nrestrictions. (CVE-2011-3544)\n\nA flaw was found in the AWTKeyStroke implementation. An untrusted Java\napplication or applet running in a sandbox could use this flaw to bypass\nsandbox restrictions. (CVE-2011-3548)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the Java2D code used to perform transformations of graphic shapes\nand images. An untrusted Java application or applet running in a sandbox\ncould use this flaw to bypass sandbox restrictions. (CVE-2011-3551)\n\nAn insufficient error checking flaw was found in the unpacker for JAR files\nin pack200 format. A specially-crafted JAR file could use this flaw to\ncrash the Java Virtual Machine (JVM) or, possibly, execute arbitrary code\nwith JVM privileges. (CVE-2011-3554)\n\nIt was found that HttpsURLConnection did not perform SecurityManager checks\nin the setSSLSocketFactory method. An untrusted Java application or applet\nrunning in a sandbox could use this flaw to bypass connection restrictions\ndefined in the policy. (CVE-2011-3560)\n\nA flaw was found in the way the SSL 3 and TLS 1.0 protocols used block\nciphers in cipher-block chaining (CBC) mode. An attacker able to perform a\nchosen plain text attack against a connection mixing trusted and untrusted\ndata could use this flaw to recover portions of the trusted data sent over\nthe connection. (CVE-2011-3389)\n\nNote: This update mitigates the CVE-2011-3389 issue by splitting the first\napplication data record byte to a separate SSL/TLS protocol record. This\nmitigation may cause compatibility issues with some SSL/TLS implementations\nand can be disabled using the jsse.enableCBCProtection boolean property.\nThis can be done on the command line by appending the flag\n\"-Djsse.enableCBCProtection=false\" to the java command.\n\nAn information leak flaw was found in the InputStream.skip implementation.\nAn untrusted Java application or applet could possibly use this flaw to\nobtain bytes skipped by other threads. (CVE-2011-3547)\n\nA flaw was found in the Java HotSpot virtual machine. An untrusted Java\napplication or applet could use this flaw to disclose portions of the VM\nmemory, or cause it to crash. (CVE-2011-3558)\n\nThe Java API for XML Web Services (JAX-WS) implementation in OpenJDK was\nconfigured to include the stack trace in error messages sent to clients. A\nremote client could possibly use this flaw to obtain sensitive information.\n(CVE-2011-3553)\n\nIt was found that Java applications running with SecurityManager\nrestrictions were allowed to use too many UDP sockets by default. If\nmultiple instances of a malicious application were started at the same\ntime, they could exhaust all available UDP sockets on the system.\n(CVE-2011-3552)\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.9.10. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1380",
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS",
"url": "http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1380.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-openjdk security update",
"tracking": {
"current_release_date": "2024-11-14T11:30:14+00:00",
"generator": {
"date": "2024-11-14T11:30:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2011:1380",
"initial_release_date": "2011-10-18T23:19:00+00:00",
"revision_history": [
{
"date": "2011-10-18T23:19:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-10-18T19:26:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T11:30:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3558",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745492"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3558"
},
{
"category": "external",
"summary": "RHBZ#745492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-10-18T23:19:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1380"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src",
"5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386",
"5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src",
"6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686",
"6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
}
]
}
rhsa-2013:1455
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.4.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.4. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0865,\nCVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873,\nCVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545,\nCVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550,\nCVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560, CVE-2011-3561, CVE-2011-3563, CVE-2011-5035,\nCVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507,\nCVE-2012-0547, CVE-2012-0551, CVE-2012-1531, CVE-2012-1532, CVE-2012-1533,\nCVE-2012-1541, CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717,\nCVE-2012-1718, CVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1725,\nCVE-2012-3143, CVE-2012-3159, CVE-2012-3213, CVE-2012-3216, CVE-2012-3342,\nCVE-2012-4820, CVE-2012-4822, CVE-2012-4823, CVE-2012-5068, CVE-2012-5069,\nCVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5079,\nCVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5089, CVE-2013-0169,\nCVE-2013-0351, CVE-2013-0401, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,\nCVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428,\nCVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438,\nCVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445,\nCVE-2013-0446, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476,\nCVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486, CVE-2013-1487,\nCVE-2013-1491, CVE-2013-1493, CVE-2013-1500, CVE-2013-1537, CVE-2013-1540,\nCVE-2013-1557, CVE-2013-1563, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383,\nCVE-2013-2384, CVE-2013-2394, CVE-2013-2407, CVE-2013-2412, CVE-2013-2417,\nCVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424,\nCVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435,\nCVE-2013-2437, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444,\nCVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451,\nCVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456,\nCVE-2013-2457, CVE-2013-2459, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465,\nCVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471,\nCVE-2013-2472, CVE-2013-2473, CVE-2013-3743)\n\nUsers of Red Hat Network Satellite Server 5.4 are advised to upgrade to\nthese updated packages, which contain the IBM Java SE 6 SR14 release. For\nthis update to take effect, Red Hat Network Satellite Server must be\nrestarted (\"/usr/sbin/rhn-satellite restart\"), as well as all running\ninstances of IBM Java.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1455",
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
},
{
"category": "external",
"summary": "829360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "706106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106"
},
{
"category": "external",
"summary": "706139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139"
},
{
"category": "external",
"summary": "706153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153"
},
{
"category": "external",
"summary": "706234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234"
},
{
"category": "external",
"summary": "706241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241"
},
{
"category": "external",
"summary": "706248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248"
},
{
"category": "external",
"summary": "711675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675"
},
{
"category": "external",
"summary": "711676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676"
},
{
"category": "external",
"summary": "711677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "788606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788606"
},
{
"category": "external",
"summary": "788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "789301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301"
},
{
"category": "external",
"summary": "790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "external",
"summary": "790724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724"
},
{
"category": "external",
"summary": "829358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358"
},
{
"category": "external",
"summary": "829361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361"
},
{
"category": "external",
"summary": "829371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371"
},
{
"category": "external",
"summary": "829372",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372"
},
{
"category": "external",
"summary": "829376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376"
},
{
"category": "external",
"summary": "831353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353"
},
{
"category": "external",
"summary": "831354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354"
},
{
"category": "external",
"summary": "831355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355"
},
{
"category": "external",
"summary": "853097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097"
},
{
"category": "external",
"summary": "853228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228"
},
{
"category": "external",
"summary": "859140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140"
},
{
"category": "external",
"summary": "865346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346"
},
{
"category": "external",
"summary": "865348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348"
},
{
"category": "external",
"summary": "865357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357"
},
{
"category": "external",
"summary": "865363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363"
},
{
"category": "external",
"summary": "865365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365"
},
{
"category": "external",
"summary": "865370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370"
},
{
"category": "external",
"summary": "865511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511"
},
{
"category": "external",
"summary": "865514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514"
},
{
"category": "external",
"summary": "865519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519"
},
{
"category": "external",
"summary": "865531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531"
},
{
"category": "external",
"summary": "865568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568"
},
{
"category": "external",
"summary": "867185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185"
},
{
"category": "external",
"summary": "867186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186"
},
{
"category": "external",
"summary": "867187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187"
},
{
"category": "external",
"summary": "867189",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189"
},
{
"category": "external",
"summary": "867190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190"
},
{
"category": "external",
"summary": "867193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193"
},
{
"category": "external",
"summary": "876386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386"
},
{
"category": "external",
"summary": "876388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388"
},
{
"category": "external",
"summary": "876389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389"
},
{
"category": "external",
"summary": "906813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813"
},
{
"category": "external",
"summary": "906892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892"
},
{
"category": "external",
"summary": "906894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894"
},
{
"category": "external",
"summary": "906899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899"
},
{
"category": "external",
"summary": "906900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900"
},
{
"category": "external",
"summary": "906904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904"
},
{
"category": "external",
"summary": "906911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911"
},
{
"category": "external",
"summary": "906914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914"
},
{
"category": "external",
"summary": "906916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916"
},
{
"category": "external",
"summary": "906917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917"
},
{
"category": "external",
"summary": "906918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918"
},
{
"category": "external",
"summary": "906921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921"
},
{
"category": "external",
"summary": "906923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923"
},
{
"category": "external",
"summary": "906933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933"
},
{
"category": "external",
"summary": "906935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935"
},
{
"category": "external",
"summary": "907207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207"
},
{
"category": "external",
"summary": "907219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219"
},
{
"category": "external",
"summary": "907223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223"
},
{
"category": "external",
"summary": "907224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224"
},
{
"category": "external",
"summary": "907226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226"
},
{
"category": "external",
"summary": "907340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340"
},
{
"category": "external",
"summary": "907344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344"
},
{
"category": "external",
"summary": "907346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346"
},
{
"category": "external",
"summary": "907453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453"
},
{
"category": "external",
"summary": "907455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455"
},
{
"category": "external",
"summary": "907456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456"
},
{
"category": "external",
"summary": "907457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457"
},
{
"category": "external",
"summary": "907458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458"
},
{
"category": "external",
"summary": "907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "913014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014"
},
{
"category": "external",
"summary": "913030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030"
},
{
"category": "external",
"summary": "917550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550"
},
{
"category": "external",
"summary": "917553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553"
},
{
"category": "external",
"summary": "920245",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245"
},
{
"category": "external",
"summary": "920248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248"
},
{
"category": "external",
"summary": "952387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387"
},
{
"category": "external",
"summary": "952509",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509"
},
{
"category": "external",
"summary": "952521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521"
},
{
"category": "external",
"summary": "952524",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524"
},
{
"category": "external",
"summary": "952638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638"
},
{
"category": "external",
"summary": "952642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642"
},
{
"category": "external",
"summary": "952648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648"
},
{
"category": "external",
"summary": "952656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656"
},
{
"category": "external",
"summary": "952657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657"
},
{
"category": "external",
"summary": "952708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708"
},
{
"category": "external",
"summary": "952709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709"
},
{
"category": "external",
"summary": "952711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711"
},
{
"category": "external",
"summary": "953166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166"
},
{
"category": "external",
"summary": "953172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172"
},
{
"category": "external",
"summary": "953265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265"
},
{
"category": "external",
"summary": "953267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267"
},
{
"category": "external",
"summary": "953269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269"
},
{
"category": "external",
"summary": "953270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270"
},
{
"category": "external",
"summary": "953273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273"
},
{
"category": "external",
"summary": "953275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275"
},
{
"category": "external",
"summary": "973474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474"
},
{
"category": "external",
"summary": "975099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099"
},
{
"category": "external",
"summary": "975102",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102"
},
{
"category": "external",
"summary": "975107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107"
},
{
"category": "external",
"summary": "975110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110"
},
{
"category": "external",
"summary": "975115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115"
},
{
"category": "external",
"summary": "975118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118"
},
{
"category": "external",
"summary": "975120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120"
},
{
"category": "external",
"summary": "975121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121"
},
{
"category": "external",
"summary": "975125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125"
},
{
"category": "external",
"summary": "975127",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127"
},
{
"category": "external",
"summary": "975129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129"
},
{
"category": "external",
"summary": "975131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131"
},
{
"category": "external",
"summary": "975132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132"
},
{
"category": "external",
"summary": "975133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133"
},
{
"category": "external",
"summary": "975134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134"
},
{
"category": "external",
"summary": "975137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137"
},
{
"category": "external",
"summary": "975138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138"
},
{
"category": "external",
"summary": "975139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139"
},
{
"category": "external",
"summary": "975140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140"
},
{
"category": "external",
"summary": "975141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141"
},
{
"category": "external",
"summary": "975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142"
},
{
"category": "external",
"summary": "975144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144"
},
{
"category": "external",
"summary": "975146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146"
},
{
"category": "external",
"summary": "975148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148"
},
{
"category": "external",
"summary": "975757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757"
},
{
"category": "external",
"summary": "975761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761"
},
{
"category": "external",
"summary": "975764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764"
},
{
"category": "external",
"summary": "975767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767"
},
{
"category": "external",
"summary": "975770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "975773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1455.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update",
"tracking": {
"current_release_date": "2025-09-26T03:10:16+00:00",
"generator": {
"date": "2025-09-26T03:10:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2013:1455",
"initial_release_date": "2013-10-23T16:26:00+00:00",
"revision_history": [
{
"date": "2013-10-23T16:26:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-10-23T16:30:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:10:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.4 (RHEL v.5)",
"product": {
"name": "Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.4::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 5.4 (RHEL v.6)",
"product": {
"name": "Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.4::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"relates_to_product_reference": "6Server-Satellite"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0802",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711677"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0802"
},
{
"category": "external",
"summary": "RHBZ#711677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)"
},
{
"cve": "CVE-2011-0814",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711677"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0802.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0814"
},
{
"category": "external",
"summary": "RHBZ#711677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0814",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0814"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)"
},
{
"cve": "CVE-2011-0862",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706139"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0862"
},
{
"category": "external",
"summary": "RHBZ#706139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0862",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0862"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)"
},
{
"cve": "CVE-2011-0863",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711676"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0863"
},
{
"category": "external",
"summary": "RHBZ#711676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0863",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)"
},
{
"cve": "CVE-2011-0865",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706106"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0865"
},
{
"category": "external",
"summary": "RHBZ#706106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0865"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)"
},
{
"cve": "CVE-2011-0867",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706153"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: NetworkInterface information leak (Networking, 7013969)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0867"
},
{
"category": "external",
"summary": "RHBZ#706153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0867",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: NetworkInterface information leak (Networking, 7013969)"
},
{
"cve": "CVE-2011-0868",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706241"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0868"
},
{
"category": "external",
"summary": "RHBZ#706241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0868"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)"
},
{
"cve": "CVE-2011-0869",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706234"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 26 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to SAAJ.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0869"
},
{
"category": "external",
"summary": "RHBZ#706234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0869",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869"
}
],
"release_date": "2011-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)"
},
{
"cve": "CVE-2011-0871",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706248"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0871"
},
{
"category": "external",
"summary": "RHBZ#706248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)"
},
{
"cve": "CVE-2011-0873",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711675"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, and 5.0 Update 29 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u26 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0873"
},
{
"category": "external",
"summary": "RHBZ#711675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0873",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u26 (2D)"
},
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3516",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747203"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3516"
},
{
"category": "external",
"summary": "RHBZ#747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3546",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747205"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3546"
},
{
"category": "external",
"summary": "RHBZ#747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3550",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747200"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3550"
},
{
"category": "external",
"summary": "RHBZ#747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3561",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747208"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3561"
},
{
"category": "external",
"summary": "RHBZ#747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3563",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789295"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3563"
},
{
"category": "external",
"summary": "RHBZ#789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)"
},
{
"cve": "CVE-2011-5035",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "771283"
}
],
"notes": [
{
"category": "description",
"text": "Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue affects the GlassFish Web Container component. This\ncomponent is not shipped with any Red Hat products. JBoss Web and Tomcat\nprovide the web container used in all JBoss products.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-5035"
},
{
"category": "external",
"summary": "RHBZ#771283",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-5035",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5035"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-0497",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789301"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0497"
},
{
"category": "external",
"summary": "RHBZ#789301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0497"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)"
},
{
"cve": "CVE-2012-0498",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790720"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0498"
},
{
"category": "external",
"summary": "RHBZ#790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0498"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0499",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790722"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0499"
},
{
"category": "external",
"summary": "RHBZ#790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0500",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790724"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0500"
},
{
"category": "external",
"summary": "RHBZ#790724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)"
},
{
"cve": "CVE-2012-0501",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788624"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0501"
},
{
"category": "external",
"summary": "RHBZ#788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)"
},
{
"cve": "CVE-2012-0502",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789297"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0502"
},
{
"category": "external",
"summary": "RHBZ#789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)"
},
{
"cve": "CVE-2012-0503",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788976"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0503"
},
{
"category": "external",
"summary": "RHBZ#788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)"
},
{
"cve": "CVE-2012-0505",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789299"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0505"
},
{
"category": "external",
"summary": "RHBZ#789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)"
},
{
"cve": "CVE-2012-0506",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789300"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0506"
},
{
"category": "external",
"summary": "RHBZ#789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)"
},
{
"cve": "CVE-2012-0507",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788994"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0507"
},
{
"category": "external",
"summary": "RHBZ#788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0507"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)"
},
{
"cve": "CVE-2012-0547",
"discovery_date": "2012-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "853228"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and \"a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited.\" NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"toolkit internals references.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AWT hardening fixes (AWT, 7163201)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0547"
},
{
"category": "external",
"summary": "RHBZ#853228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547"
}
],
"release_date": "2012-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: AWT hardening fixes (AWT, 7163201)"
},
{
"cve": "CVE-2012-0551",
"discovery_date": "2012-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831355"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0551"
},
{
"category": "external",
"summary": "RHBZ#831355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0551",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)"
},
{
"cve": "CVE-2012-1531",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867185"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1531"
},
{
"category": "external",
"summary": "RHBZ#867185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1531",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1531"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (2D)"
},
{
"cve": "CVE-2012-1532",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867186"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier and 6 Update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1532"
},
{
"category": "external",
"summary": "RHBZ#867186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1532",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1532"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (Deployment)"
},
{
"cve": "CVE-2012-1533",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867187"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-3159.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1533"
},
{
"category": "external",
"summary": "RHBZ#867187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1533",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1533"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (Deployment)"
},
{
"cve": "CVE-2012-1541",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906914"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1541"
},
{
"category": "external",
"summary": "RHBZ#906914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2012-1682",
"discovery_date": "2012-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "853097"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"XMLDecoder security issue via ClassFinder.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1682"
},
{
"category": "external",
"summary": "RHBZ#853097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1682"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html",
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html"
}
],
"release_date": "2012-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)"
},
{
"cve": "CVE-2012-1713",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829361"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1713"
},
{
"category": "external",
"summary": "RHBZ#829361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1713"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)"
},
{
"cve": "CVE-2012-1716",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829360"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1716"
},
{
"category": "external",
"summary": "RHBZ#829360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)"
},
{
"cve": "CVE-2012-1717",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829358"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1717"
},
{
"category": "external",
"summary": "RHBZ#829358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)"
},
{
"cve": "CVE-2012-1718",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829372"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1718"
},
{
"category": "external",
"summary": "RHBZ#829372",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)"
},
{
"cve": "CVE-2012-1719",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829371"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1719"
},
{
"category": "external",
"summary": "RHBZ#829371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)"
},
{
"cve": "CVE-2012-1721",
"discovery_date": "2012-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831353"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1721"
},
{
"category": "external",
"summary": "RHBZ#831353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)"
},
{
"cve": "CVE-2012-1722",
"discovery_date": "2012-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831354"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1721.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1722"
},
{
"category": "external",
"summary": "RHBZ#831354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1722",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1722"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)"
},
{
"cve": "CVE-2012-1725",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829376"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1725"
},
{
"category": "external",
"summary": "RHBZ#829376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)"
},
{
"cve": "CVE-2012-3143",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867189"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-5089.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (JMX)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3143"
},
{
"category": "external",
"summary": "RHBZ#867189",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (JMX)"
},
{
"cve": "CVE-2012-3159",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867190"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3159"
},
{
"category": "external",
"summary": "RHBZ#867190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3159",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability (Deployment)"
},
{
"cve": "CVE-2012-3213",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907223"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3213"
},
{
"category": "external",
"summary": "RHBZ#907223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)"
},
{
"cve": "CVE-2012-3216",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865346"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3216"
},
{
"category": "external",
"summary": "RHBZ#865346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3216",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3216"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)"
},
{
"cve": "CVE-2012-3342",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906917"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3342"
},
{
"category": "external",
"summary": "RHBZ#906917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2012-4820",
"discovery_date": "2012-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "876386"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, when running under a security manager, allows remote attackers to gain privileges by modifying or removing the security manager via vectors related to \"insecure use of the java.lang.reflect.Method invoke() method.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: java.lang.reflect.Method invoke() code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4820"
},
{
"category": "external",
"summary": "RHBZ#876386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4820",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820"
},
{
"category": "external",
"summary": "http://xforce.iss.net/xforce/xfdb/78764",
"url": "http://xforce.iss.net/xforce/xfdb/78764"
}
],
"release_date": "2012-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: java.lang.reflect.Method invoke() code execution"
},
{
"cve": "CVE-2012-4822",
"discovery_date": "2012-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "876388"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allow remote attackers to execute arbitrary code via vectors related to \"insecure use [of] multiple methods in the java.lang.class class.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: java.lang.class code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4822"
},
{
"category": "external",
"summary": "RHBZ#876388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4822",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4822"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822"
},
{
"category": "external",
"summary": "http://xforce.iss.net/xforce/xfdb/78766",
"url": "http://xforce.iss.net/xforce/xfdb/78766"
}
],
"release_date": "2012-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: java.lang.class code execution"
},
{
"cve": "CVE-2012-4823",
"discovery_date": "2012-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "876389"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allows remote attackers to execute arbitrary code via vectors related to \"insecure use of the java.lang.ClassLoder defineClass() method.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: java.lang.ClassLoder defineClass() code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4823"
},
{
"category": "external",
"summary": "RHBZ#876389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4823",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823"
},
{
"category": "external",
"summary": "http://xforce.iss.net/xforce/xfdb/78767",
"url": "http://xforce.iss.net/xforce/xfdb/78767"
}
],
"release_date": "2012-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: java.lang.ClassLoder defineClass() code execution"
},
{
"cve": "CVE-2012-5068",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865348"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5068"
},
{
"category": "external",
"summary": "RHBZ#865348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5068"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)"
},
{
"cve": "CVE-2012-5069",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865531"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Executors state handling issues (Concurrency, 7189103)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5069"
},
{
"category": "external",
"summary": "RHBZ#865531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5069",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5069"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: Executors state handling issues (Concurrency, 7189103)"
},
{
"cve": "CVE-2012-5071",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865519"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5071"
},
{
"category": "external",
"summary": "RHBZ#865519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5071",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)"
},
{
"cve": "CVE-2012-5072",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865365"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5072"
},
{
"category": "external",
"summary": "RHBZ#865365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5072"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)"
},
{
"cve": "CVE-2012-5073",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865357"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: LogManager security bypass (Libraries, 7169884)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5073"
},
{
"category": "external",
"summary": "RHBZ#865357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5073",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5073"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: LogManager security bypass (Libraries, 7169884)"
},
{
"cve": "CVE-2012-5075",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865363"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5075"
},
{
"category": "external",
"summary": "RHBZ#865363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5075",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5075"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)"
},
{
"cve": "CVE-2012-5079",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865568"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5079"
},
{
"category": "external",
"summary": "RHBZ#865568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5079",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5079"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)"
},
{
"cve": "CVE-2012-5081",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865370"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JSSE denial of service (JSSE, 7186286)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5081"
},
{
"category": "external",
"summary": "RHBZ#865370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5081",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JSSE denial of service (JSSE, 7186286)"
},
{
"cve": "CVE-2012-5083",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867193"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5083"
},
{
"category": "external",
"summary": "RHBZ#867193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5083",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (2D)"
},
{
"cve": "CVE-2012-5084",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865511"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5084"
},
{
"category": "external",
"summary": "RHBZ#865511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5084",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5084"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)"
},
{
"cve": "CVE-2012-5089",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865514"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5089"
},
{
"category": "external",
"summary": "RHBZ#865514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5089",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5089"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)"
},
{
"cve": "CVE-2013-0169",
"discovery_date": "2013-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907589"
}
],
"notes": [
{
"category": "description",
"text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SSL/TLS: CBC padding timing attack (lucky-13)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0169"
},
{
"category": "external",
"summary": "RHBZ#907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169"
},
{
"category": "external",
"summary": "http://www.isg.rhul.ac.uk/tls/",
"url": "http://www.isg.rhul.ac.uk/tls/"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20130205.txt",
"url": "http://www.openssl.org/news/secadv_20130205.txt"
},
{
"category": "external",
"summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released",
"url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released"
}
],
"release_date": "2013-02-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
},
{
"category": "workaround",
"details": "On OpenShift Container Platform 3.11 it\u0027s possible to edit the list of cipher suites offered by the router when performing \u0027edge\u0027, or \u0027re-encrypt\u0027 TLS modes. Please follow the documentation [1], and [2] to remove the vulnerable CBC ciphers use the modern, or intermediate cipher suites outlined by Mozilla instead [3]. In \u0027passthrough\u0027 mode TLS termination occurs in the application so that is another way to mitigate the vulnerability.\n[1] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#obtaining-router-configuration-template\n[2] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#using-configmap-replace-template\n[3] https://wiki.mozilla.org/Security/Server_Side_TLS",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SSL/TLS: CBC padding timing attack (lucky-13)"
},
{
"cve": "CVE-2013-0351",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906923"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0351"
},
{
"category": "external",
"summary": "RHBZ#906923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0351"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0401",
"discovery_date": "2013-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "920245"
}
],
"notes": [
{
"category": "description",
"text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0401"
},
{
"category": "external",
"summary": "RHBZ#920245",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)"
},
{
"cve": "CVE-2013-0409",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907226"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0409"
},
{
"category": "external",
"summary": "RHBZ#907226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)"
},
{
"cve": "CVE-2013-0419",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906918"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0419"
},
{
"category": "external",
"summary": "RHBZ#906918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0423",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906921"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0423"
},
{
"category": "external",
"summary": "RHBZ#906921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0423"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0424",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906813"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0424"
},
{
"category": "external",
"summary": "RHBZ#906813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0424"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)"
},
{
"cve": "CVE-2013-0425",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907344"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0425"
},
{
"category": "external",
"summary": "RHBZ#907344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)"
},
{
"cve": "CVE-2013-0426",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907346"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0426"
},
{
"category": "external",
"summary": "RHBZ#907346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0426"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)"
},
{
"cve": "CVE-2013-0427",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907455"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0427"
},
{
"category": "external",
"summary": "RHBZ#907455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)"
},
{
"cve": "CVE-2013-0428",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907207"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0428"
},
{
"category": "external",
"summary": "RHBZ#907207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0428"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)"
},
{
"cve": "CVE-2013-0432",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907219"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0432"
},
{
"category": "external",
"summary": "RHBZ#907219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)"
},
{
"cve": "CVE-2013-0433",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907456"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0433"
},
{
"category": "external",
"summary": "RHBZ#907456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0433"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)"
},
{
"cve": "CVE-2013-0434",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907453"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0434"
},
{
"category": "external",
"summary": "RHBZ#907453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)"
},
{
"cve": "CVE-2013-0435",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906892"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0435"
},
{
"category": "external",
"summary": "RHBZ#906892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)"
},
{
"cve": "CVE-2013-0438",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906935"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0438"
},
{
"category": "external",
"summary": "RHBZ#906935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0440",
"discovery_date": "2012-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "859140"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0440"
},
{
"category": "external",
"summary": "RHBZ#859140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)"
},
{
"cve": "CVE-2013-0441",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907458"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing serialization restriction (CORBA, 7201066)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0441"
},
{
"category": "external",
"summary": "RHBZ#907458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing serialization restriction (CORBA, 7201066)"
},
{
"cve": "CVE-2013-0442",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906899"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0442"
},
{
"category": "external",
"summary": "RHBZ#906899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)"
},
{
"cve": "CVE-2013-0443",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907340"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0443"
},
{
"category": "external",
"summary": "RHBZ#907340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)"
},
{
"cve": "CVE-2013-0445",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906900"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0445"
},
{
"category": "external",
"summary": "RHBZ#906900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0445"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)"
},
{
"cve": "CVE-2013-0446",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906916"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0446"
},
{
"category": "external",
"summary": "RHBZ#906916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0446"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0450",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906911"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0450"
},
{
"category": "external",
"summary": "RHBZ#906911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)"
},
{
"cve": "CVE-2013-0809",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2013-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "917550"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0809"
},
{
"category": "external",
"summary": "RHBZ#917550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html",
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html"
}
],
"release_date": "2013-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)"
},
{
"cve": "CVE-2013-1473",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906933"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1473"
},
{
"category": "external",
"summary": "RHBZ#906933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1473"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-1476",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907457"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1476"
},
{
"category": "external",
"summary": "RHBZ#907457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)"
},
{
"cve": "CVE-2013-1478",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906894"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1478"
},
{
"category": "external",
"summary": "RHBZ#906894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)"
},
{
"cve": "CVE-2013-1480",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906904"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1480"
},
{
"category": "external",
"summary": "RHBZ#906904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)"
},
{
"cve": "CVE-2013-1481",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907224"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1481"
},
{
"category": "external",
"summary": "RHBZ#907224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1481",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 (Sound)"
},
{
"cve": "CVE-2013-1486",
"discovery_date": "2013-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "913014"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1486"
},
{
"category": "external",
"summary": "RHBZ#913014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)"
},
{
"cve": "CVE-2013-1487",
"discovery_date": "2013-02-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "913030"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1487"
},
{
"category": "external",
"summary": "RHBZ#913030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1487",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)"
},
{
"cve": "CVE-2013-1491",
"discovery_date": "2013-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "920248"
}
],
"notes": [
{
"category": "description",
"text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to execute arbitrary code via vectors related to 2D, as demonstrated by Joshua Drake during a Pwn2Own competition at CanSecWest 2013.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1491"
},
{
"category": "external",
"summary": "RHBZ#920248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1491",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491"
}
],
"release_date": "2013-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)"
},
{
"cve": "CVE-2013-1493",
"discovery_date": "2013-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "917553"
}
],
"notes": [
{
"category": "description",
"text": "The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1493"
},
{
"category": "external",
"summary": "RHBZ#917553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1493",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1493"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html",
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html"
}
],
"release_date": "2013-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)"
},
{
"acknowledgments": [
{
"names": [
"Tim Brown"
]
}
],
"cve": "CVE-2013-1500",
"discovery_date": "2013-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975148"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Insecure shared memory permissions (2D, 8001034)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1500"
},
{
"category": "external",
"summary": "RHBZ#975148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1500",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: Insecure shared memory permissions (2D, 8001034)"
},
{
"cve": "CVE-2013-1537",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform \"dynamic class downloading\" and execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: remote code loading enabled by default (RMI, 8001040)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1537"
},
{
"category": "external",
"summary": "RHBZ#952387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1537",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1537"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: remote code loading enabled by default (RMI, 8001040)"
},
{
"cve": "CVE-2013-1540",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953166"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2433.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1540"
},
{
"category": "external",
"summary": "RHBZ#953166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1540",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1540"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-1557",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952648"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"missing security restrictions\" in the LogStream.setDefaultStream method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1557"
},
{
"category": "external",
"summary": "RHBZ#952648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)"
},
{
"cve": "CVE-2013-1563",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953172"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1563"
},
{
"category": "external",
"summary": "RHBZ#953172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1563"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)"
},
{
"cve": "CVE-2013-1569",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952711"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"checking of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1569"
},
{
"category": "external",
"summary": "RHBZ#952711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1569"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)"
},
{
"acknowledgments": [
{
"names": [
"US-CERT"
]
}
],
"cve": "CVE-2013-1571",
"discovery_date": "2013-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "973474"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1571"
},
{
"category": "external",
"summary": "RHBZ#973474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1571",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1571"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571"
},
{
"category": "external",
"summary": "http://www.kb.cert.org/vuls/id/225657",
"url": "http://www.kb.cert.org/vuls/id/225657"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)"
},
{
"cve": "CVE-2013-2383",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952708"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"handling of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2383"
},
{
"category": "external",
"summary": "RHBZ#952708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2383"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)"
},
{
"cve": "CVE-2013-2384",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952709"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font layout\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2384"
},
{
"category": "external",
"summary": "RHBZ#952709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2384"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)"
},
{
"cve": "CVE-2013-2394",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953265"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2432 and CVE-2013-1491.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2394"
},
{
"category": "external",
"summary": "RHBZ#953265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2394"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)"
},
{
"cve": "CVE-2013-2407",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975127"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"XML security and the class loader.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2407"
},
{
"category": "external",
"summary": "RHBZ#975127",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)"
},
{
"cve": "CVE-2013-2412",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975144"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JConsole SSL support (Serviceability, 8003703)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2412"
},
{
"category": "external",
"summary": "RHBZ#975144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2412"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JConsole SSL support (Serviceability, 8003703)"
},
{
"cve": "CVE-2013-2417",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952657"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2417"
},
{
"category": "external",
"summary": "RHBZ#952657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2417"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)"
},
{
"cve": "CVE-2013-2418",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953267"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2418"
},
{
"category": "external",
"summary": "RHBZ#953267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2419",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952656"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font processing errors\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2419"
},
{
"category": "external",
"summary": "RHBZ#952656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)"
},
{
"cve": "CVE-2013-2420",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952638"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient \"validation of images\" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: image processing vulnerability (2D, 8007617)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2420"
},
{
"category": "external",
"summary": "RHBZ#952638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: image processing vulnerability (2D, 8007617)"
},
{
"cve": "CVE-2013-2422",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952642"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2422"
},
{
"category": "external",
"summary": "RHBZ#952642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2422"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)"
},
{
"cve": "CVE-2013-2424",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952509"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient class access checks\" when \"creating new instances\" using MBeanInstantiator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2424"
},
{
"category": "external",
"summary": "RHBZ#952509",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2424"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)"
},
{
"cve": "CVE-2013-2429",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952521"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageWriter state corruption\" when using native code, which triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2429"
},
{
"category": "external",
"summary": "RHBZ#952521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2429"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)"
},
{
"cve": "CVE-2013-2430",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952524"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageReader state corruption\" when using native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2430"
},
{
"category": "external",
"summary": "RHBZ#952524",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2430"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)"
},
{
"cve": "CVE-2013-2432",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953269"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2394 and CVE-2013-1491.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2432"
},
{
"category": "external",
"summary": "RHBZ#953269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)"
},
{
"cve": "CVE-2013-2433",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953270"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-1540.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2433"
},
{
"category": "external",
"summary": "RHBZ#953270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2433"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2435",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953273"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2435"
},
{
"category": "external",
"summary": "RHBZ#953273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2437",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975773"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2437"
},
{
"category": "external",
"summary": "RHBZ#975773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2437"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2440",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953275"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2435.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2440"
},
{
"category": "external",
"summary": "RHBZ#953275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2442",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975770"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2466 and CVE-2013-2468.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2442"
},
{
"category": "external",
"summary": "RHBZ#975770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2443",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975137"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect \"checking order\" within the AccessControlContext class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2443"
},
{
"category": "external",
"summary": "RHBZ#975137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)"
},
{
"cve": "CVE-2013-2444",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975131"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not \"properly manage and restrict certain resources related to the processing of fonts,\" possibly involving temporary files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Resource denial of service (AWT, 8001038)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2444"
},
{
"category": "external",
"summary": "RHBZ#975131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2444"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Resource denial of service (AWT, 8001038)"
},
{
"cve": "CVE-2013-2446",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975132"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: output stream access restrictions (CORBA, 8000642)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2446"
},
{
"category": "external",
"summary": "RHBZ#975132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2446"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: output stream access restrictions (CORBA, 8000642)"
},
{
"cve": "CVE-2013-2447",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975140"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket\u0027s local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Prevent revealing the local address (Networking, 8001318)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2447"
},
{
"category": "external",
"summary": "RHBZ#975140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Prevent revealing the local address (Networking, 8001318)"
},
{
"cve": "CVE-2013-2448",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975125"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient \"access restrictions\" and \"robustness of sound classes.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Better access restrictions (Sound, 8006328)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2448"
},
{
"category": "external",
"summary": "RHBZ#975125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2448"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Better access restrictions (Sound, 8006328)"
},
{
"cve": "CVE-2013-2450",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975141"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2450"
},
{
"category": "external",
"summary": "RHBZ#975141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)"
},
{
"cve": "CVE-2013-2451",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975146"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: exclusive port binding (Networking, 7170730)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2451"
},
{
"category": "external",
"summary": "RHBZ#975146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2451"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: exclusive port binding (Networking, 7170730)"
},
{
"cve": "CVE-2013-2452",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975138"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"network address handling in virtual machine identifiers\" and the lack of \"unique and unpredictable IDs\" in the java.rmi.dgc.VMID class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Unique VMIDs (Libraries, 8001033)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2452"
},
{
"category": "external",
"summary": "RHBZ#975138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2452"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Unique VMIDs (Libraries, 8001033)"
},
{
"cve": "CVE-2013-2453",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975134"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for \"package access\" by the MBeanServer Introspector.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2453"
},
{
"category": "external",
"summary": "RHBZ#975134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2453"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)"
},
{
"cve": "CVE-2013-2454",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975129"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2454"
},
{
"category": "external",
"summary": "RHBZ#975129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2454"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)"
},
{
"cve": "CVE-2013-2455",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975139"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: getEnclosing* checks (Libraries, 8007812)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2455"
},
{
"category": "external",
"summary": "RHBZ#975139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2455"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: getEnclosing* checks (Libraries, 8007812)"
},
{
"cve": "CVE-2013-2456",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975142"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2456"
},
{
"category": "external",
"summary": "RHBZ#975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2456"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)"
},
{
"cve": "CVE-2013-2457",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975133"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of \"certain class checks\" that allows remote attackers to bypass intended class restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Proper class checking (JMX, 8008120)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2457"
},
{
"category": "external",
"summary": "RHBZ#975133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2457"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Proper class checking (JMX, 8008120)"
},
{
"cve": "CVE-2013-2459",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975121"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"integer overflow checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2459"
},
{
"category": "external",
"summary": "RHBZ#975121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)"
},
{
"cve": "CVE-2013-2463",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975115"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image attribute verification\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect image attribute verification (2D, 8012438)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2463"
},
{
"category": "external",
"summary": "RHBZ#975115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2463"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect image attribute verification (2D, 8012438)"
},
{
"cve": "CVE-2013-2464",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975757"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, and CVE-2013-2473.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2464"
},
{
"category": "external",
"summary": "RHBZ#975757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2464"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (2D)"
},
{
"cve": "CVE-2013-2465",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975118"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect image channel verification (2D, 8012597)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2465"
},
{
"category": "external",
"summary": "RHBZ#975118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-28T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect image channel verification (2D, 8012597)"
},
{
"cve": "CVE-2013-2466",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975764"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2468.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2466"
},
{
"category": "external",
"summary": "RHBZ#975764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2466"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2468",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975761"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2466.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2468"
},
{
"category": "external",
"summary": "RHBZ#975761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2468"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2469",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975120"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image layout verification\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect image layout verification (2D, 8012601)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2469"
},
{
"category": "external",
"summary": "RHBZ#975120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2469"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect image layout verification (2D, 8012601)"
},
{
"cve": "CVE-2013-2470",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975099"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"ImagingLib byte lookup processing.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2470"
},
{
"category": "external",
"summary": "RHBZ#975099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2470"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)"
},
{
"cve": "CVE-2013-2471",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975102"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect IntegerComponentRaster size checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2471"
},
{
"category": "external",
"summary": "RHBZ#975102",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)"
},
{
"cve": "CVE-2013-2472",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975107"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ShortBandedRaster size checks\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2472"
},
{
"category": "external",
"summary": "RHBZ#975107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2472"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)"
},
{
"cve": "CVE-2013-2473",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975110"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ByteBandedRaster size checks\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2473"
},
{
"category": "external",
"summary": "RHBZ#975110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2473"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)"
},
{
"cve": "CVE-2013-3743",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975767"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 45 and earlier and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-3743"
},
{
"category": "external",
"summary": "RHBZ#975767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)"
}
]
}
RHSA-2013:1455
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.4.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.4. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0865,\nCVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873,\nCVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545,\nCVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550,\nCVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560, CVE-2011-3561, CVE-2011-3563, CVE-2011-5035,\nCVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507,\nCVE-2012-0547, CVE-2012-0551, CVE-2012-1531, CVE-2012-1532, CVE-2012-1533,\nCVE-2012-1541, CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717,\nCVE-2012-1718, CVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1725,\nCVE-2012-3143, CVE-2012-3159, CVE-2012-3213, CVE-2012-3216, CVE-2012-3342,\nCVE-2012-4820, CVE-2012-4822, CVE-2012-4823, CVE-2012-5068, CVE-2012-5069,\nCVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5079,\nCVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5089, CVE-2013-0169,\nCVE-2013-0351, CVE-2013-0401, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,\nCVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428,\nCVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438,\nCVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445,\nCVE-2013-0446, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476,\nCVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486, CVE-2013-1487,\nCVE-2013-1491, CVE-2013-1493, CVE-2013-1500, CVE-2013-1537, CVE-2013-1540,\nCVE-2013-1557, CVE-2013-1563, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383,\nCVE-2013-2384, CVE-2013-2394, CVE-2013-2407, CVE-2013-2412, CVE-2013-2417,\nCVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424,\nCVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435,\nCVE-2013-2437, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444,\nCVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451,\nCVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456,\nCVE-2013-2457, CVE-2013-2459, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465,\nCVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471,\nCVE-2013-2472, CVE-2013-2473, CVE-2013-3743)\n\nUsers of Red Hat Network Satellite Server 5.4 are advised to upgrade to\nthese updated packages, which contain the IBM Java SE 6 SR14 release. For\nthis update to take effect, Red Hat Network Satellite Server must be\nrestarted (\"/usr/sbin/rhn-satellite restart\"), as well as all running\ninstances of IBM Java.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1455",
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
},
{
"category": "external",
"summary": "829360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "706106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106"
},
{
"category": "external",
"summary": "706139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139"
},
{
"category": "external",
"summary": "706153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153"
},
{
"category": "external",
"summary": "706234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234"
},
{
"category": "external",
"summary": "706241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241"
},
{
"category": "external",
"summary": "706248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248"
},
{
"category": "external",
"summary": "711675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675"
},
{
"category": "external",
"summary": "711676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676"
},
{
"category": "external",
"summary": "711677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "788606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788606"
},
{
"category": "external",
"summary": "788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "789301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301"
},
{
"category": "external",
"summary": "790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "external",
"summary": "790724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724"
},
{
"category": "external",
"summary": "829358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358"
},
{
"category": "external",
"summary": "829361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361"
},
{
"category": "external",
"summary": "829371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371"
},
{
"category": "external",
"summary": "829372",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372"
},
{
"category": "external",
"summary": "829376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376"
},
{
"category": "external",
"summary": "831353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353"
},
{
"category": "external",
"summary": "831354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354"
},
{
"category": "external",
"summary": "831355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355"
},
{
"category": "external",
"summary": "853097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097"
},
{
"category": "external",
"summary": "853228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228"
},
{
"category": "external",
"summary": "859140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140"
},
{
"category": "external",
"summary": "865346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346"
},
{
"category": "external",
"summary": "865348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348"
},
{
"category": "external",
"summary": "865357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357"
},
{
"category": "external",
"summary": "865363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363"
},
{
"category": "external",
"summary": "865365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365"
},
{
"category": "external",
"summary": "865370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370"
},
{
"category": "external",
"summary": "865511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511"
},
{
"category": "external",
"summary": "865514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514"
},
{
"category": "external",
"summary": "865519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519"
},
{
"category": "external",
"summary": "865531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531"
},
{
"category": "external",
"summary": "865568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568"
},
{
"category": "external",
"summary": "867185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185"
},
{
"category": "external",
"summary": "867186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186"
},
{
"category": "external",
"summary": "867187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187"
},
{
"category": "external",
"summary": "867189",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189"
},
{
"category": "external",
"summary": "867190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190"
},
{
"category": "external",
"summary": "867193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193"
},
{
"category": "external",
"summary": "876386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386"
},
{
"category": "external",
"summary": "876388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388"
},
{
"category": "external",
"summary": "876389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389"
},
{
"category": "external",
"summary": "906813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813"
},
{
"category": "external",
"summary": "906892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892"
},
{
"category": "external",
"summary": "906894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894"
},
{
"category": "external",
"summary": "906899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899"
},
{
"category": "external",
"summary": "906900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900"
},
{
"category": "external",
"summary": "906904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904"
},
{
"category": "external",
"summary": "906911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911"
},
{
"category": "external",
"summary": "906914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914"
},
{
"category": "external",
"summary": "906916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916"
},
{
"category": "external",
"summary": "906917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917"
},
{
"category": "external",
"summary": "906918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918"
},
{
"category": "external",
"summary": "906921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921"
},
{
"category": "external",
"summary": "906923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923"
},
{
"category": "external",
"summary": "906933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933"
},
{
"category": "external",
"summary": "906935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935"
},
{
"category": "external",
"summary": "907207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207"
},
{
"category": "external",
"summary": "907219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219"
},
{
"category": "external",
"summary": "907223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223"
},
{
"category": "external",
"summary": "907224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224"
},
{
"category": "external",
"summary": "907226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226"
},
{
"category": "external",
"summary": "907340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340"
},
{
"category": "external",
"summary": "907344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344"
},
{
"category": "external",
"summary": "907346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346"
},
{
"category": "external",
"summary": "907453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453"
},
{
"category": "external",
"summary": "907455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455"
},
{
"category": "external",
"summary": "907456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456"
},
{
"category": "external",
"summary": "907457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457"
},
{
"category": "external",
"summary": "907458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458"
},
{
"category": "external",
"summary": "907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "913014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014"
},
{
"category": "external",
"summary": "913030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030"
},
{
"category": "external",
"summary": "917550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550"
},
{
"category": "external",
"summary": "917553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553"
},
{
"category": "external",
"summary": "920245",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245"
},
{
"category": "external",
"summary": "920248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248"
},
{
"category": "external",
"summary": "952387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387"
},
{
"category": "external",
"summary": "952509",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509"
},
{
"category": "external",
"summary": "952521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521"
},
{
"category": "external",
"summary": "952524",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524"
},
{
"category": "external",
"summary": "952638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638"
},
{
"category": "external",
"summary": "952642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642"
},
{
"category": "external",
"summary": "952648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648"
},
{
"category": "external",
"summary": "952656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656"
},
{
"category": "external",
"summary": "952657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657"
},
{
"category": "external",
"summary": "952708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708"
},
{
"category": "external",
"summary": "952709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709"
},
{
"category": "external",
"summary": "952711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711"
},
{
"category": "external",
"summary": "953166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166"
},
{
"category": "external",
"summary": "953172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172"
},
{
"category": "external",
"summary": "953265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265"
},
{
"category": "external",
"summary": "953267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267"
},
{
"category": "external",
"summary": "953269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269"
},
{
"category": "external",
"summary": "953270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270"
},
{
"category": "external",
"summary": "953273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273"
},
{
"category": "external",
"summary": "953275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275"
},
{
"category": "external",
"summary": "973474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474"
},
{
"category": "external",
"summary": "975099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099"
},
{
"category": "external",
"summary": "975102",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102"
},
{
"category": "external",
"summary": "975107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107"
},
{
"category": "external",
"summary": "975110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110"
},
{
"category": "external",
"summary": "975115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115"
},
{
"category": "external",
"summary": "975118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118"
},
{
"category": "external",
"summary": "975120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120"
},
{
"category": "external",
"summary": "975121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121"
},
{
"category": "external",
"summary": "975125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125"
},
{
"category": "external",
"summary": "975127",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127"
},
{
"category": "external",
"summary": "975129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129"
},
{
"category": "external",
"summary": "975131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131"
},
{
"category": "external",
"summary": "975132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132"
},
{
"category": "external",
"summary": "975133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133"
},
{
"category": "external",
"summary": "975134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134"
},
{
"category": "external",
"summary": "975137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137"
},
{
"category": "external",
"summary": "975138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138"
},
{
"category": "external",
"summary": "975139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139"
},
{
"category": "external",
"summary": "975140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140"
},
{
"category": "external",
"summary": "975141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141"
},
{
"category": "external",
"summary": "975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142"
},
{
"category": "external",
"summary": "975144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144"
},
{
"category": "external",
"summary": "975146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146"
},
{
"category": "external",
"summary": "975148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148"
},
{
"category": "external",
"summary": "975757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757"
},
{
"category": "external",
"summary": "975761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761"
},
{
"category": "external",
"summary": "975764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764"
},
{
"category": "external",
"summary": "975767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767"
},
{
"category": "external",
"summary": "975770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "975773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1455.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update",
"tracking": {
"current_release_date": "2025-09-26T03:10:16+00:00",
"generator": {
"date": "2025-09-26T03:10:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2013:1455",
"initial_release_date": "2013-10-23T16:26:00+00:00",
"revision_history": [
{
"date": "2013-10-23T16:26:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-10-23T16:30:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:10:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.4 (RHEL v.5)",
"product": {
"name": "Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.4::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 5.4 (RHEL v.6)",
"product": {
"name": "Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.4::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"relates_to_product_reference": "6Server-Satellite"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0802",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711677"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0802"
},
{
"category": "external",
"summary": "RHBZ#711677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)"
},
{
"cve": "CVE-2011-0814",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711677"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0802.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0814"
},
{
"category": "external",
"summary": "RHBZ#711677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0814",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0814"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)"
},
{
"cve": "CVE-2011-0862",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706139"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0862"
},
{
"category": "external",
"summary": "RHBZ#706139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0862",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0862"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)"
},
{
"cve": "CVE-2011-0863",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711676"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0863"
},
{
"category": "external",
"summary": "RHBZ#711676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0863",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)"
},
{
"cve": "CVE-2011-0865",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706106"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0865"
},
{
"category": "external",
"summary": "RHBZ#706106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0865"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)"
},
{
"cve": "CVE-2011-0867",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706153"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: NetworkInterface information leak (Networking, 7013969)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0867"
},
{
"category": "external",
"summary": "RHBZ#706153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0867",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: NetworkInterface information leak (Networking, 7013969)"
},
{
"cve": "CVE-2011-0868",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706241"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0868"
},
{
"category": "external",
"summary": "RHBZ#706241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0868"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)"
},
{
"cve": "CVE-2011-0869",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706234"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 26 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to SAAJ.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0869"
},
{
"category": "external",
"summary": "RHBZ#706234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0869",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869"
}
],
"release_date": "2011-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)"
},
{
"cve": "CVE-2011-0871",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706248"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0871"
},
{
"category": "external",
"summary": "RHBZ#706248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)"
},
{
"cve": "CVE-2011-0873",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711675"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, and 5.0 Update 29 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u26 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0873"
},
{
"category": "external",
"summary": "RHBZ#711675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0873",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u26 (2D)"
},
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3516",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747203"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3516"
},
{
"category": "external",
"summary": "RHBZ#747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3546",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747205"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3546"
},
{
"category": "external",
"summary": "RHBZ#747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3550",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747200"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3550"
},
{
"category": "external",
"summary": "RHBZ#747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3561",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747208"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3561"
},
{
"category": "external",
"summary": "RHBZ#747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3563",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789295"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3563"
},
{
"category": "external",
"summary": "RHBZ#789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)"
},
{
"cve": "CVE-2011-5035",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "771283"
}
],
"notes": [
{
"category": "description",
"text": "Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue affects the GlassFish Web Container component. This\ncomponent is not shipped with any Red Hat products. JBoss Web and Tomcat\nprovide the web container used in all JBoss products.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-5035"
},
{
"category": "external",
"summary": "RHBZ#771283",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-5035",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5035"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-0497",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789301"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0497"
},
{
"category": "external",
"summary": "RHBZ#789301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0497"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)"
},
{
"cve": "CVE-2012-0498",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790720"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0498"
},
{
"category": "external",
"summary": "RHBZ#790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0498"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0499",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790722"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0499"
},
{
"category": "external",
"summary": "RHBZ#790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0500",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790724"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0500"
},
{
"category": "external",
"summary": "RHBZ#790724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)"
},
{
"cve": "CVE-2012-0501",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788624"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0501"
},
{
"category": "external",
"summary": "RHBZ#788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)"
},
{
"cve": "CVE-2012-0502",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789297"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0502"
},
{
"category": "external",
"summary": "RHBZ#789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)"
},
{
"cve": "CVE-2012-0503",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788976"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0503"
},
{
"category": "external",
"summary": "RHBZ#788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)"
},
{
"cve": "CVE-2012-0505",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789299"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0505"
},
{
"category": "external",
"summary": "RHBZ#789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)"
},
{
"cve": "CVE-2012-0506",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789300"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0506"
},
{
"category": "external",
"summary": "RHBZ#789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)"
},
{
"cve": "CVE-2012-0507",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788994"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0507"
},
{
"category": "external",
"summary": "RHBZ#788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0507"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)"
},
{
"cve": "CVE-2012-0547",
"discovery_date": "2012-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "853228"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and \"a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited.\" NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"toolkit internals references.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AWT hardening fixes (AWT, 7163201)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0547"
},
{
"category": "external",
"summary": "RHBZ#853228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547"
}
],
"release_date": "2012-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: AWT hardening fixes (AWT, 7163201)"
},
{
"cve": "CVE-2012-0551",
"discovery_date": "2012-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831355"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0551"
},
{
"category": "external",
"summary": "RHBZ#831355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0551",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)"
},
{
"cve": "CVE-2012-1531",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867185"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1531"
},
{
"category": "external",
"summary": "RHBZ#867185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1531",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1531"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (2D)"
},
{
"cve": "CVE-2012-1532",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867186"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier and 6 Update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1532"
},
{
"category": "external",
"summary": "RHBZ#867186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1532",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1532"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (Deployment)"
},
{
"cve": "CVE-2012-1533",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867187"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-3159.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1533"
},
{
"category": "external",
"summary": "RHBZ#867187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1533",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1533"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (Deployment)"
},
{
"cve": "CVE-2012-1541",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906914"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1541"
},
{
"category": "external",
"summary": "RHBZ#906914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2012-1682",
"discovery_date": "2012-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "853097"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"XMLDecoder security issue via ClassFinder.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1682"
},
{
"category": "external",
"summary": "RHBZ#853097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1682"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html",
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html"
}
],
"release_date": "2012-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)"
},
{
"cve": "CVE-2012-1713",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829361"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1713"
},
{
"category": "external",
"summary": "RHBZ#829361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1713"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)"
},
{
"cve": "CVE-2012-1716",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829360"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1716"
},
{
"category": "external",
"summary": "RHBZ#829360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)"
},
{
"cve": "CVE-2012-1717",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829358"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1717"
},
{
"category": "external",
"summary": "RHBZ#829358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)"
},
{
"cve": "CVE-2012-1718",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829372"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1718"
},
{
"category": "external",
"summary": "RHBZ#829372",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)"
},
{
"cve": "CVE-2012-1719",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829371"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1719"
},
{
"category": "external",
"summary": "RHBZ#829371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)"
},
{
"cve": "CVE-2012-1721",
"discovery_date": "2012-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831353"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1721"
},
{
"category": "external",
"summary": "RHBZ#831353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)"
},
{
"cve": "CVE-2012-1722",
"discovery_date": "2012-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831354"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1721.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1722"
},
{
"category": "external",
"summary": "RHBZ#831354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1722",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1722"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)"
},
{
"cve": "CVE-2012-1725",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829376"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1725"
},
{
"category": "external",
"summary": "RHBZ#829376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)"
},
{
"cve": "CVE-2012-3143",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867189"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-5089.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (JMX)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3143"
},
{
"category": "external",
"summary": "RHBZ#867189",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (JMX)"
},
{
"cve": "CVE-2012-3159",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867190"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3159"
},
{
"category": "external",
"summary": "RHBZ#867190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3159",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability (Deployment)"
},
{
"cve": "CVE-2012-3213",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907223"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3213"
},
{
"category": "external",
"summary": "RHBZ#907223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)"
},
{
"cve": "CVE-2012-3216",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865346"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3216"
},
{
"category": "external",
"summary": "RHBZ#865346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3216",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3216"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)"
},
{
"cve": "CVE-2012-3342",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906917"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3342"
},
{
"category": "external",
"summary": "RHBZ#906917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2012-4820",
"discovery_date": "2012-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "876386"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, when running under a security manager, allows remote attackers to gain privileges by modifying or removing the security manager via vectors related to \"insecure use of the java.lang.reflect.Method invoke() method.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: java.lang.reflect.Method invoke() code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4820"
},
{
"category": "external",
"summary": "RHBZ#876386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4820",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820"
},
{
"category": "external",
"summary": "http://xforce.iss.net/xforce/xfdb/78764",
"url": "http://xforce.iss.net/xforce/xfdb/78764"
}
],
"release_date": "2012-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: java.lang.reflect.Method invoke() code execution"
},
{
"cve": "CVE-2012-4822",
"discovery_date": "2012-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "876388"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allow remote attackers to execute arbitrary code via vectors related to \"insecure use [of] multiple methods in the java.lang.class class.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: java.lang.class code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4822"
},
{
"category": "external",
"summary": "RHBZ#876388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4822",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4822"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822"
},
{
"category": "external",
"summary": "http://xforce.iss.net/xforce/xfdb/78766",
"url": "http://xforce.iss.net/xforce/xfdb/78766"
}
],
"release_date": "2012-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: java.lang.class code execution"
},
{
"cve": "CVE-2012-4823",
"discovery_date": "2012-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "876389"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allows remote attackers to execute arbitrary code via vectors related to \"insecure use of the java.lang.ClassLoder defineClass() method.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: java.lang.ClassLoder defineClass() code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4823"
},
{
"category": "external",
"summary": "RHBZ#876389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4823",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823"
},
{
"category": "external",
"summary": "http://xforce.iss.net/xforce/xfdb/78767",
"url": "http://xforce.iss.net/xforce/xfdb/78767"
}
],
"release_date": "2012-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: java.lang.ClassLoder defineClass() code execution"
},
{
"cve": "CVE-2012-5068",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865348"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5068"
},
{
"category": "external",
"summary": "RHBZ#865348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5068"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)"
},
{
"cve": "CVE-2012-5069",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865531"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Executors state handling issues (Concurrency, 7189103)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5069"
},
{
"category": "external",
"summary": "RHBZ#865531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5069",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5069"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: Executors state handling issues (Concurrency, 7189103)"
},
{
"cve": "CVE-2012-5071",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865519"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5071"
},
{
"category": "external",
"summary": "RHBZ#865519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5071",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)"
},
{
"cve": "CVE-2012-5072",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865365"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5072"
},
{
"category": "external",
"summary": "RHBZ#865365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5072"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)"
},
{
"cve": "CVE-2012-5073",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865357"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: LogManager security bypass (Libraries, 7169884)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5073"
},
{
"category": "external",
"summary": "RHBZ#865357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5073",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5073"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: LogManager security bypass (Libraries, 7169884)"
},
{
"cve": "CVE-2012-5075",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865363"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5075"
},
{
"category": "external",
"summary": "RHBZ#865363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5075",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5075"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)"
},
{
"cve": "CVE-2012-5079",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865568"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5079"
},
{
"category": "external",
"summary": "RHBZ#865568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5079",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5079"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)"
},
{
"cve": "CVE-2012-5081",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865370"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JSSE denial of service (JSSE, 7186286)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5081"
},
{
"category": "external",
"summary": "RHBZ#865370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5081",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JSSE denial of service (JSSE, 7186286)"
},
{
"cve": "CVE-2012-5083",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867193"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5083"
},
{
"category": "external",
"summary": "RHBZ#867193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5083",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (2D)"
},
{
"cve": "CVE-2012-5084",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865511"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5084"
},
{
"category": "external",
"summary": "RHBZ#865511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5084",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5084"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)"
},
{
"cve": "CVE-2012-5089",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865514"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5089"
},
{
"category": "external",
"summary": "RHBZ#865514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5089",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5089"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)"
},
{
"cve": "CVE-2013-0169",
"discovery_date": "2013-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907589"
}
],
"notes": [
{
"category": "description",
"text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SSL/TLS: CBC padding timing attack (lucky-13)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0169"
},
{
"category": "external",
"summary": "RHBZ#907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169"
},
{
"category": "external",
"summary": "http://www.isg.rhul.ac.uk/tls/",
"url": "http://www.isg.rhul.ac.uk/tls/"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20130205.txt",
"url": "http://www.openssl.org/news/secadv_20130205.txt"
},
{
"category": "external",
"summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released",
"url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released"
}
],
"release_date": "2013-02-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
},
{
"category": "workaround",
"details": "On OpenShift Container Platform 3.11 it\u0027s possible to edit the list of cipher suites offered by the router when performing \u0027edge\u0027, or \u0027re-encrypt\u0027 TLS modes. Please follow the documentation [1], and [2] to remove the vulnerable CBC ciphers use the modern, or intermediate cipher suites outlined by Mozilla instead [3]. In \u0027passthrough\u0027 mode TLS termination occurs in the application so that is another way to mitigate the vulnerability.\n[1] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#obtaining-router-configuration-template\n[2] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#using-configmap-replace-template\n[3] https://wiki.mozilla.org/Security/Server_Side_TLS",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SSL/TLS: CBC padding timing attack (lucky-13)"
},
{
"cve": "CVE-2013-0351",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906923"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0351"
},
{
"category": "external",
"summary": "RHBZ#906923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0351"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0401",
"discovery_date": "2013-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "920245"
}
],
"notes": [
{
"category": "description",
"text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0401"
},
{
"category": "external",
"summary": "RHBZ#920245",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)"
},
{
"cve": "CVE-2013-0409",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907226"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0409"
},
{
"category": "external",
"summary": "RHBZ#907226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)"
},
{
"cve": "CVE-2013-0419",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906918"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0419"
},
{
"category": "external",
"summary": "RHBZ#906918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0423",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906921"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0423"
},
{
"category": "external",
"summary": "RHBZ#906921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0423"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0424",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906813"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0424"
},
{
"category": "external",
"summary": "RHBZ#906813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0424"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)"
},
{
"cve": "CVE-2013-0425",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907344"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0425"
},
{
"category": "external",
"summary": "RHBZ#907344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)"
},
{
"cve": "CVE-2013-0426",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907346"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0426"
},
{
"category": "external",
"summary": "RHBZ#907346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0426"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)"
},
{
"cve": "CVE-2013-0427",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907455"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0427"
},
{
"category": "external",
"summary": "RHBZ#907455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)"
},
{
"cve": "CVE-2013-0428",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907207"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0428"
},
{
"category": "external",
"summary": "RHBZ#907207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0428"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)"
},
{
"cve": "CVE-2013-0432",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907219"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0432"
},
{
"category": "external",
"summary": "RHBZ#907219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)"
},
{
"cve": "CVE-2013-0433",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907456"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0433"
},
{
"category": "external",
"summary": "RHBZ#907456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0433"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)"
},
{
"cve": "CVE-2013-0434",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907453"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0434"
},
{
"category": "external",
"summary": "RHBZ#907453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)"
},
{
"cve": "CVE-2013-0435",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906892"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0435"
},
{
"category": "external",
"summary": "RHBZ#906892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)"
},
{
"cve": "CVE-2013-0438",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906935"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0438"
},
{
"category": "external",
"summary": "RHBZ#906935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0440",
"discovery_date": "2012-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "859140"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0440"
},
{
"category": "external",
"summary": "RHBZ#859140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)"
},
{
"cve": "CVE-2013-0441",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907458"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing serialization restriction (CORBA, 7201066)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0441"
},
{
"category": "external",
"summary": "RHBZ#907458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing serialization restriction (CORBA, 7201066)"
},
{
"cve": "CVE-2013-0442",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906899"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0442"
},
{
"category": "external",
"summary": "RHBZ#906899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)"
},
{
"cve": "CVE-2013-0443",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907340"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0443"
},
{
"category": "external",
"summary": "RHBZ#907340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)"
},
{
"cve": "CVE-2013-0445",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906900"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0445"
},
{
"category": "external",
"summary": "RHBZ#906900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0445"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)"
},
{
"cve": "CVE-2013-0446",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906916"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0446"
},
{
"category": "external",
"summary": "RHBZ#906916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0446"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0450",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906911"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0450"
},
{
"category": "external",
"summary": "RHBZ#906911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)"
},
{
"cve": "CVE-2013-0809",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2013-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "917550"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0809"
},
{
"category": "external",
"summary": "RHBZ#917550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html",
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html"
}
],
"release_date": "2013-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)"
},
{
"cve": "CVE-2013-1473",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906933"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1473"
},
{
"category": "external",
"summary": "RHBZ#906933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1473"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-1476",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907457"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1476"
},
{
"category": "external",
"summary": "RHBZ#907457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)"
},
{
"cve": "CVE-2013-1478",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906894"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1478"
},
{
"category": "external",
"summary": "RHBZ#906894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)"
},
{
"cve": "CVE-2013-1480",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906904"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1480"
},
{
"category": "external",
"summary": "RHBZ#906904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)"
},
{
"cve": "CVE-2013-1481",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907224"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1481"
},
{
"category": "external",
"summary": "RHBZ#907224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1481",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 (Sound)"
},
{
"cve": "CVE-2013-1486",
"discovery_date": "2013-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "913014"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1486"
},
{
"category": "external",
"summary": "RHBZ#913014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)"
},
{
"cve": "CVE-2013-1487",
"discovery_date": "2013-02-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "913030"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1487"
},
{
"category": "external",
"summary": "RHBZ#913030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1487",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)"
},
{
"cve": "CVE-2013-1491",
"discovery_date": "2013-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "920248"
}
],
"notes": [
{
"category": "description",
"text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to execute arbitrary code via vectors related to 2D, as demonstrated by Joshua Drake during a Pwn2Own competition at CanSecWest 2013.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1491"
},
{
"category": "external",
"summary": "RHBZ#920248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1491",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491"
}
],
"release_date": "2013-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)"
},
{
"cve": "CVE-2013-1493",
"discovery_date": "2013-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "917553"
}
],
"notes": [
{
"category": "description",
"text": "The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1493"
},
{
"category": "external",
"summary": "RHBZ#917553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1493",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1493"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html",
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html"
}
],
"release_date": "2013-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)"
},
{
"acknowledgments": [
{
"names": [
"Tim Brown"
]
}
],
"cve": "CVE-2013-1500",
"discovery_date": "2013-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975148"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Insecure shared memory permissions (2D, 8001034)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1500"
},
{
"category": "external",
"summary": "RHBZ#975148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1500",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: Insecure shared memory permissions (2D, 8001034)"
},
{
"cve": "CVE-2013-1537",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform \"dynamic class downloading\" and execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: remote code loading enabled by default (RMI, 8001040)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1537"
},
{
"category": "external",
"summary": "RHBZ#952387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1537",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1537"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: remote code loading enabled by default (RMI, 8001040)"
},
{
"cve": "CVE-2013-1540",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953166"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2433.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1540"
},
{
"category": "external",
"summary": "RHBZ#953166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1540",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1540"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-1557",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952648"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"missing security restrictions\" in the LogStream.setDefaultStream method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1557"
},
{
"category": "external",
"summary": "RHBZ#952648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)"
},
{
"cve": "CVE-2013-1563",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953172"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1563"
},
{
"category": "external",
"summary": "RHBZ#953172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1563"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)"
},
{
"cve": "CVE-2013-1569",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952711"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"checking of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1569"
},
{
"category": "external",
"summary": "RHBZ#952711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1569"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)"
},
{
"acknowledgments": [
{
"names": [
"US-CERT"
]
}
],
"cve": "CVE-2013-1571",
"discovery_date": "2013-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "973474"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1571"
},
{
"category": "external",
"summary": "RHBZ#973474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1571",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1571"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571"
},
{
"category": "external",
"summary": "http://www.kb.cert.org/vuls/id/225657",
"url": "http://www.kb.cert.org/vuls/id/225657"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)"
},
{
"cve": "CVE-2013-2383",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952708"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"handling of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2383"
},
{
"category": "external",
"summary": "RHBZ#952708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2383"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)"
},
{
"cve": "CVE-2013-2384",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952709"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font layout\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2384"
},
{
"category": "external",
"summary": "RHBZ#952709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2384"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)"
},
{
"cve": "CVE-2013-2394",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953265"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2432 and CVE-2013-1491.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2394"
},
{
"category": "external",
"summary": "RHBZ#953265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2394"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)"
},
{
"cve": "CVE-2013-2407",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975127"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"XML security and the class loader.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2407"
},
{
"category": "external",
"summary": "RHBZ#975127",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)"
},
{
"cve": "CVE-2013-2412",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975144"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JConsole SSL support (Serviceability, 8003703)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2412"
},
{
"category": "external",
"summary": "RHBZ#975144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2412"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JConsole SSL support (Serviceability, 8003703)"
},
{
"cve": "CVE-2013-2417",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952657"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2417"
},
{
"category": "external",
"summary": "RHBZ#952657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2417"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)"
},
{
"cve": "CVE-2013-2418",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953267"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2418"
},
{
"category": "external",
"summary": "RHBZ#953267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2419",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952656"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font processing errors\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2419"
},
{
"category": "external",
"summary": "RHBZ#952656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)"
},
{
"cve": "CVE-2013-2420",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952638"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient \"validation of images\" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: image processing vulnerability (2D, 8007617)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2420"
},
{
"category": "external",
"summary": "RHBZ#952638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: image processing vulnerability (2D, 8007617)"
},
{
"cve": "CVE-2013-2422",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952642"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2422"
},
{
"category": "external",
"summary": "RHBZ#952642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2422"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)"
},
{
"cve": "CVE-2013-2424",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952509"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient class access checks\" when \"creating new instances\" using MBeanInstantiator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2424"
},
{
"category": "external",
"summary": "RHBZ#952509",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2424"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)"
},
{
"cve": "CVE-2013-2429",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952521"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageWriter state corruption\" when using native code, which triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2429"
},
{
"category": "external",
"summary": "RHBZ#952521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2429"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)"
},
{
"cve": "CVE-2013-2430",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952524"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageReader state corruption\" when using native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2430"
},
{
"category": "external",
"summary": "RHBZ#952524",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2430"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)"
},
{
"cve": "CVE-2013-2432",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953269"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2394 and CVE-2013-1491.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2432"
},
{
"category": "external",
"summary": "RHBZ#953269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)"
},
{
"cve": "CVE-2013-2433",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953270"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-1540.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2433"
},
{
"category": "external",
"summary": "RHBZ#953270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2433"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2435",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953273"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2435"
},
{
"category": "external",
"summary": "RHBZ#953273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2437",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975773"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2437"
},
{
"category": "external",
"summary": "RHBZ#975773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2437"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2440",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953275"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2435.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2440"
},
{
"category": "external",
"summary": "RHBZ#953275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2442",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975770"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2466 and CVE-2013-2468.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2442"
},
{
"category": "external",
"summary": "RHBZ#975770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2443",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975137"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect \"checking order\" within the AccessControlContext class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2443"
},
{
"category": "external",
"summary": "RHBZ#975137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)"
},
{
"cve": "CVE-2013-2444",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975131"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not \"properly manage and restrict certain resources related to the processing of fonts,\" possibly involving temporary files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Resource denial of service (AWT, 8001038)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2444"
},
{
"category": "external",
"summary": "RHBZ#975131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2444"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Resource denial of service (AWT, 8001038)"
},
{
"cve": "CVE-2013-2446",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975132"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: output stream access restrictions (CORBA, 8000642)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2446"
},
{
"category": "external",
"summary": "RHBZ#975132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2446"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: output stream access restrictions (CORBA, 8000642)"
},
{
"cve": "CVE-2013-2447",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975140"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket\u0027s local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Prevent revealing the local address (Networking, 8001318)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2447"
},
{
"category": "external",
"summary": "RHBZ#975140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Prevent revealing the local address (Networking, 8001318)"
},
{
"cve": "CVE-2013-2448",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975125"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient \"access restrictions\" and \"robustness of sound classes.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Better access restrictions (Sound, 8006328)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2448"
},
{
"category": "external",
"summary": "RHBZ#975125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2448"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Better access restrictions (Sound, 8006328)"
},
{
"cve": "CVE-2013-2450",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975141"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2450"
},
{
"category": "external",
"summary": "RHBZ#975141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)"
},
{
"cve": "CVE-2013-2451",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975146"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: exclusive port binding (Networking, 7170730)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2451"
},
{
"category": "external",
"summary": "RHBZ#975146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2451"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: exclusive port binding (Networking, 7170730)"
},
{
"cve": "CVE-2013-2452",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975138"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"network address handling in virtual machine identifiers\" and the lack of \"unique and unpredictable IDs\" in the java.rmi.dgc.VMID class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Unique VMIDs (Libraries, 8001033)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2452"
},
{
"category": "external",
"summary": "RHBZ#975138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2452"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Unique VMIDs (Libraries, 8001033)"
},
{
"cve": "CVE-2013-2453",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975134"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for \"package access\" by the MBeanServer Introspector.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2453"
},
{
"category": "external",
"summary": "RHBZ#975134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2453"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)"
},
{
"cve": "CVE-2013-2454",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975129"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2454"
},
{
"category": "external",
"summary": "RHBZ#975129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2454"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)"
},
{
"cve": "CVE-2013-2455",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975139"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: getEnclosing* checks (Libraries, 8007812)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2455"
},
{
"category": "external",
"summary": "RHBZ#975139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2455"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: getEnclosing* checks (Libraries, 8007812)"
},
{
"cve": "CVE-2013-2456",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975142"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2456"
},
{
"category": "external",
"summary": "RHBZ#975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2456"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)"
},
{
"cve": "CVE-2013-2457",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975133"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of \"certain class checks\" that allows remote attackers to bypass intended class restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Proper class checking (JMX, 8008120)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2457"
},
{
"category": "external",
"summary": "RHBZ#975133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2457"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Proper class checking (JMX, 8008120)"
},
{
"cve": "CVE-2013-2459",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975121"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"integer overflow checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2459"
},
{
"category": "external",
"summary": "RHBZ#975121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)"
},
{
"cve": "CVE-2013-2463",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975115"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image attribute verification\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect image attribute verification (2D, 8012438)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2463"
},
{
"category": "external",
"summary": "RHBZ#975115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2463"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect image attribute verification (2D, 8012438)"
},
{
"cve": "CVE-2013-2464",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975757"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, and CVE-2013-2473.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2464"
},
{
"category": "external",
"summary": "RHBZ#975757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2464"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (2D)"
},
{
"cve": "CVE-2013-2465",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975118"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect image channel verification (2D, 8012597)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2465"
},
{
"category": "external",
"summary": "RHBZ#975118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-28T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect image channel verification (2D, 8012597)"
},
{
"cve": "CVE-2013-2466",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975764"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2468.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2466"
},
{
"category": "external",
"summary": "RHBZ#975764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2466"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2468",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975761"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2466.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2468"
},
{
"category": "external",
"summary": "RHBZ#975761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2468"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2469",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975120"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image layout verification\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect image layout verification (2D, 8012601)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2469"
},
{
"category": "external",
"summary": "RHBZ#975120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2469"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect image layout verification (2D, 8012601)"
},
{
"cve": "CVE-2013-2470",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975099"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"ImagingLib byte lookup processing.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2470"
},
{
"category": "external",
"summary": "RHBZ#975099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2470"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)"
},
{
"cve": "CVE-2013-2471",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975102"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect IntegerComponentRaster size checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2471"
},
{
"category": "external",
"summary": "RHBZ#975102",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)"
},
{
"cve": "CVE-2013-2472",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975107"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ShortBandedRaster size checks\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2472"
},
{
"category": "external",
"summary": "RHBZ#975107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2472"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)"
},
{
"cve": "CVE-2013-2473",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975110"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ByteBandedRaster size checks\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2473"
},
{
"category": "external",
"summary": "RHBZ#975110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2473"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)"
},
{
"cve": "CVE-2013-3743",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975767"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 45 and earlier and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-3743"
},
{
"category": "external",
"summary": "RHBZ#975767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)"
}
]
}
rhsa-2012:0006
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.4.2-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise\nLinux 5 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM Java SE version 1.4.2 release includes the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3545,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560)\n\nAll users of java-1.4.2-ibm are advised to upgrade to these updated\npackages, which contain the IBM Java 1.4.2 SR13-FP11 release. All running\ninstances of IBM Java must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0006",
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0006.json"
}
],
"title": "Red Hat Security Advisory: java-1.4.2-ibm security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:17+00:00",
"generator": {
"date": "2025-09-26T03:12:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2012:0006",
"initial_release_date": "2012-01-09T20:03:00+00:00",
"revision_history": [
{
"date": "2012-01-09T20:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-01-09T20:07:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-09T20:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0006"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x",
"4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x",
"5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
}
]
}
rhsa-2013_1455
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.4.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.4. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0865,\nCVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873,\nCVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545,\nCVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550,\nCVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560, CVE-2011-3561, CVE-2011-3563, CVE-2011-5035,\nCVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507,\nCVE-2012-0547, CVE-2012-0551, CVE-2012-1531, CVE-2012-1532, CVE-2012-1533,\nCVE-2012-1541, CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717,\nCVE-2012-1718, CVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1725,\nCVE-2012-3143, CVE-2012-3159, CVE-2012-3213, CVE-2012-3216, CVE-2012-3342,\nCVE-2012-4820, CVE-2012-4822, CVE-2012-4823, CVE-2012-5068, CVE-2012-5069,\nCVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5079,\nCVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5089, CVE-2013-0169,\nCVE-2013-0351, CVE-2013-0401, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,\nCVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428,\nCVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438,\nCVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445,\nCVE-2013-0446, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476,\nCVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486, CVE-2013-1487,\nCVE-2013-1491, CVE-2013-1493, CVE-2013-1500, CVE-2013-1537, CVE-2013-1540,\nCVE-2013-1557, CVE-2013-1563, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383,\nCVE-2013-2384, CVE-2013-2394, CVE-2013-2407, CVE-2013-2412, CVE-2013-2417,\nCVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424,\nCVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435,\nCVE-2013-2437, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444,\nCVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451,\nCVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456,\nCVE-2013-2457, CVE-2013-2459, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465,\nCVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471,\nCVE-2013-2472, CVE-2013-2473, CVE-2013-3743)\n\nUsers of Red Hat Network Satellite Server 5.4 are advised to upgrade to\nthese updated packages, which contain the IBM Java SE 6 SR14 release. For\nthis update to take effect, Red Hat Network Satellite Server must be\nrestarted (\"/usr/sbin/rhn-satellite restart\"), as well as all running\ninstances of IBM Java.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1455",
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "706106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106"
},
{
"category": "external",
"summary": "706139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139"
},
{
"category": "external",
"summary": "706153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153"
},
{
"category": "external",
"summary": "706234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234"
},
{
"category": "external",
"summary": "706241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241"
},
{
"category": "external",
"summary": "706248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248"
},
{
"category": "external",
"summary": "711675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675"
},
{
"category": "external",
"summary": "711676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676"
},
{
"category": "external",
"summary": "711677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "788606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788606"
},
{
"category": "external",
"summary": "788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "789301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301"
},
{
"category": "external",
"summary": "790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "external",
"summary": "790724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724"
},
{
"category": "external",
"summary": "829358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358"
},
{
"category": "external",
"summary": "829360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360"
},
{
"category": "external",
"summary": "829361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361"
},
{
"category": "external",
"summary": "829371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371"
},
{
"category": "external",
"summary": "829372",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372"
},
{
"category": "external",
"summary": "829376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376"
},
{
"category": "external",
"summary": "831353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353"
},
{
"category": "external",
"summary": "831354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354"
},
{
"category": "external",
"summary": "831355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355"
},
{
"category": "external",
"summary": "853097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097"
},
{
"category": "external",
"summary": "853228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228"
},
{
"category": "external",
"summary": "859140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140"
},
{
"category": "external",
"summary": "865346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346"
},
{
"category": "external",
"summary": "865348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348"
},
{
"category": "external",
"summary": "865357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357"
},
{
"category": "external",
"summary": "865363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363"
},
{
"category": "external",
"summary": "865365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365"
},
{
"category": "external",
"summary": "865370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370"
},
{
"category": "external",
"summary": "865511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511"
},
{
"category": "external",
"summary": "865514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514"
},
{
"category": "external",
"summary": "865519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519"
},
{
"category": "external",
"summary": "865531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531"
},
{
"category": "external",
"summary": "865568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568"
},
{
"category": "external",
"summary": "867185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185"
},
{
"category": "external",
"summary": "867186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186"
},
{
"category": "external",
"summary": "867187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187"
},
{
"category": "external",
"summary": "867189",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189"
},
{
"category": "external",
"summary": "867190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190"
},
{
"category": "external",
"summary": "867193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193"
},
{
"category": "external",
"summary": "876386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386"
},
{
"category": "external",
"summary": "876388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388"
},
{
"category": "external",
"summary": "876389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389"
},
{
"category": "external",
"summary": "906813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813"
},
{
"category": "external",
"summary": "906892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892"
},
{
"category": "external",
"summary": "906894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894"
},
{
"category": "external",
"summary": "906899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899"
},
{
"category": "external",
"summary": "906900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900"
},
{
"category": "external",
"summary": "906904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904"
},
{
"category": "external",
"summary": "906911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911"
},
{
"category": "external",
"summary": "906914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914"
},
{
"category": "external",
"summary": "906916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916"
},
{
"category": "external",
"summary": "906917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917"
},
{
"category": "external",
"summary": "906918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918"
},
{
"category": "external",
"summary": "906921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921"
},
{
"category": "external",
"summary": "906923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923"
},
{
"category": "external",
"summary": "906933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933"
},
{
"category": "external",
"summary": "906935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935"
},
{
"category": "external",
"summary": "907207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207"
},
{
"category": "external",
"summary": "907219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219"
},
{
"category": "external",
"summary": "907223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223"
},
{
"category": "external",
"summary": "907224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224"
},
{
"category": "external",
"summary": "907226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226"
},
{
"category": "external",
"summary": "907340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340"
},
{
"category": "external",
"summary": "907344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344"
},
{
"category": "external",
"summary": "907346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346"
},
{
"category": "external",
"summary": "907453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453"
},
{
"category": "external",
"summary": "907455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455"
},
{
"category": "external",
"summary": "907456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456"
},
{
"category": "external",
"summary": "907457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457"
},
{
"category": "external",
"summary": "907458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458"
},
{
"category": "external",
"summary": "907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "913014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014"
},
{
"category": "external",
"summary": "913030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030"
},
{
"category": "external",
"summary": "917550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550"
},
{
"category": "external",
"summary": "917553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553"
},
{
"category": "external",
"summary": "920245",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245"
},
{
"category": "external",
"summary": "920248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248"
},
{
"category": "external",
"summary": "952387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387"
},
{
"category": "external",
"summary": "952509",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509"
},
{
"category": "external",
"summary": "952521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521"
},
{
"category": "external",
"summary": "952524",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524"
},
{
"category": "external",
"summary": "952638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638"
},
{
"category": "external",
"summary": "952642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642"
},
{
"category": "external",
"summary": "952648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648"
},
{
"category": "external",
"summary": "952656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656"
},
{
"category": "external",
"summary": "952657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657"
},
{
"category": "external",
"summary": "952708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708"
},
{
"category": "external",
"summary": "952709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709"
},
{
"category": "external",
"summary": "952711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711"
},
{
"category": "external",
"summary": "953166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166"
},
{
"category": "external",
"summary": "953172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172"
},
{
"category": "external",
"summary": "953265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265"
},
{
"category": "external",
"summary": "953267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267"
},
{
"category": "external",
"summary": "953269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269"
},
{
"category": "external",
"summary": "953270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270"
},
{
"category": "external",
"summary": "953273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273"
},
{
"category": "external",
"summary": "953275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275"
},
{
"category": "external",
"summary": "973474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474"
},
{
"category": "external",
"summary": "975099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099"
},
{
"category": "external",
"summary": "975102",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102"
},
{
"category": "external",
"summary": "975107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107"
},
{
"category": "external",
"summary": "975110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110"
},
{
"category": "external",
"summary": "975115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115"
},
{
"category": "external",
"summary": "975118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118"
},
{
"category": "external",
"summary": "975120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120"
},
{
"category": "external",
"summary": "975121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121"
},
{
"category": "external",
"summary": "975125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125"
},
{
"category": "external",
"summary": "975127",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127"
},
{
"category": "external",
"summary": "975129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129"
},
{
"category": "external",
"summary": "975131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131"
},
{
"category": "external",
"summary": "975132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132"
},
{
"category": "external",
"summary": "975133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133"
},
{
"category": "external",
"summary": "975134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134"
},
{
"category": "external",
"summary": "975137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137"
},
{
"category": "external",
"summary": "975138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138"
},
{
"category": "external",
"summary": "975139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139"
},
{
"category": "external",
"summary": "975140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140"
},
{
"category": "external",
"summary": "975141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141"
},
{
"category": "external",
"summary": "975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142"
},
{
"category": "external",
"summary": "975144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144"
},
{
"category": "external",
"summary": "975146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146"
},
{
"category": "external",
"summary": "975148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148"
},
{
"category": "external",
"summary": "975757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757"
},
{
"category": "external",
"summary": "975761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761"
},
{
"category": "external",
"summary": "975764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764"
},
{
"category": "external",
"summary": "975767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767"
},
{
"category": "external",
"summary": "975770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770"
},
{
"category": "external",
"summary": "975773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1455.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update",
"tracking": {
"current_release_date": "2024-12-08T10:38:36+00:00",
"generator": {
"date": "2024-12-08T10:38:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2013:1455",
"initial_release_date": "2013-10-23T16:26:00+00:00",
"revision_history": [
{
"date": "2013-10-23T16:26:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-10-23T16:30:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-08T10:38:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.4 (RHEL v.5)",
"product": {
"name": "Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.4::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 5.4 (RHEL v.6)",
"product": {
"name": "Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.4::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)",
"product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"relates_to_product_reference": "5Server-Satellite54"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"relates_to_product_reference": "6Server-Satellite"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)",
"product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"relates_to_product_reference": "6Server-Satellite"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0802",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711677"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0802"
},
{
"category": "external",
"summary": "RHBZ#711677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)"
},
{
"cve": "CVE-2011-0814",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711677"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0802.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0814"
},
{
"category": "external",
"summary": "RHBZ#711677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0814",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0814"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)"
},
{
"cve": "CVE-2011-0862",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706139"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0862"
},
{
"category": "external",
"summary": "RHBZ#706139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0862",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0862"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)"
},
{
"cve": "CVE-2011-0863",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711676"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0863"
},
{
"category": "external",
"summary": "RHBZ#711676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0863",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)"
},
{
"cve": "CVE-2011-0865",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706106"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0865"
},
{
"category": "external",
"summary": "RHBZ#706106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0865"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)"
},
{
"cve": "CVE-2011-0867",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706153"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: NetworkInterface information leak (Networking, 7013969)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0867"
},
{
"category": "external",
"summary": "RHBZ#706153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0867",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: NetworkInterface information leak (Networking, 7013969)"
},
{
"cve": "CVE-2011-0868",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706241"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0868"
},
{
"category": "external",
"summary": "RHBZ#706241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0868"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)"
},
{
"cve": "CVE-2011-0869",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706234"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 26 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to SAAJ.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0869"
},
{
"category": "external",
"summary": "RHBZ#706234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0869",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869"
}
],
"release_date": "2011-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)"
},
{
"cve": "CVE-2011-0871",
"discovery_date": "2011-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "706248"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0871"
},
{
"category": "external",
"summary": "RHBZ#706248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)"
},
{
"cve": "CVE-2011-0873",
"discovery_date": "2011-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "711675"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, and 5.0 Update 29 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u26 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0873"
},
{
"category": "external",
"summary": "RHBZ#711675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0873",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873"
}
],
"release_date": "2011-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u26 (2D)"
},
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3516",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747203"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3516"
},
{
"category": "external",
"summary": "RHBZ#747203",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3521",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745442"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3521"
},
{
"category": "external",
"summary": "RHBZ#745442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)"
},
{
"cve": "CVE-2011-3544",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745399"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3544"
},
{
"category": "external",
"summary": "RHBZ#745399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)"
},
{
"cve": "CVE-2011-3545",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747191"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3545"
},
{
"category": "external",
"summary": "RHBZ#747191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)"
},
{
"cve": "CVE-2011-3546",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747205"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3546"
},
{
"category": "external",
"summary": "RHBZ#747205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3547",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3547"
},
{
"category": "external",
"summary": "RHBZ#745387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)"
},
{
"cve": "CVE-2011-3548",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745473"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3548"
},
{
"category": "external",
"summary": "RHBZ#745473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)"
},
{
"cve": "CVE-2011-3549",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747198"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3549"
},
{
"category": "external",
"summary": "RHBZ#747198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)"
},
{
"cve": "CVE-2011-3550",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747200"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3550"
},
{
"category": "external",
"summary": "RHBZ#747200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)"
},
{
"cve": "CVE-2011-3551",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745391"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3551"
},
{
"category": "external",
"summary": "RHBZ#745391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)"
},
{
"cve": "CVE-2011-3552",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745397"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3552"
},
{
"category": "external",
"summary": "RHBZ#745397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)"
},
{
"cve": "CVE-2011-3553",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745476"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3553"
},
{
"category": "external",
"summary": "RHBZ#745476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)"
},
{
"cve": "CVE-2011-3554",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745447"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3554"
},
{
"category": "external",
"summary": "RHBZ#745447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)"
},
{
"cve": "CVE-2011-3556",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745459"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3556"
},
{
"category": "external",
"summary": "RHBZ#745459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3561",
"discovery_date": "2011-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747208"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3561"
},
{
"category": "external",
"summary": "RHBZ#747208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)"
},
{
"cve": "CVE-2011-3563",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789295"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3563"
},
{
"category": "external",
"summary": "RHBZ#789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)"
},
{
"cve": "CVE-2011-5035",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "771283"
}
],
"notes": [
{
"category": "description",
"text": "Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue affects the GlassFish Web Container component. This\ncomponent is not shipped with any Red Hat products. JBoss Web and Tomcat\nprovide the web container used in all JBoss products.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-5035"
},
{
"category": "external",
"summary": "RHBZ#771283",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-5035",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5035"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-0497",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789301"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0497"
},
{
"category": "external",
"summary": "RHBZ#789301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0497"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)"
},
{
"cve": "CVE-2012-0498",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790720"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0498"
},
{
"category": "external",
"summary": "RHBZ#790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0498"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0499",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790722"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0499"
},
{
"category": "external",
"summary": "RHBZ#790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0500",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790724"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0500"
},
{
"category": "external",
"summary": "RHBZ#790724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)"
},
{
"cve": "CVE-2012-0501",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788624"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0501"
},
{
"category": "external",
"summary": "RHBZ#788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)"
},
{
"cve": "CVE-2012-0502",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789297"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0502"
},
{
"category": "external",
"summary": "RHBZ#789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)"
},
{
"cve": "CVE-2012-0503",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788976"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0503"
},
{
"category": "external",
"summary": "RHBZ#788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)"
},
{
"cve": "CVE-2012-0505",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789299"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0505"
},
{
"category": "external",
"summary": "RHBZ#789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)"
},
{
"cve": "CVE-2012-0506",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789300"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0506"
},
{
"category": "external",
"summary": "RHBZ#789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)"
},
{
"cve": "CVE-2012-0507",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788994"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0507"
},
{
"category": "external",
"summary": "RHBZ#788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0507"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)"
},
{
"cve": "CVE-2012-0547",
"discovery_date": "2012-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "853228"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and \"a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited.\" NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"toolkit internals references.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AWT hardening fixes (AWT, 7163201)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0547"
},
{
"category": "external",
"summary": "RHBZ#853228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547"
}
],
"release_date": "2012-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: AWT hardening fixes (AWT, 7163201)"
},
{
"cve": "CVE-2012-0551",
"discovery_date": "2012-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831355"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0551"
},
{
"category": "external",
"summary": "RHBZ#831355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0551",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)"
},
{
"cve": "CVE-2012-1531",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867185"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1531"
},
{
"category": "external",
"summary": "RHBZ#867185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1531",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1531"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (2D)"
},
{
"cve": "CVE-2012-1532",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867186"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier and 6 Update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1532"
},
{
"category": "external",
"summary": "RHBZ#867186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1532",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1532"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (Deployment)"
},
{
"cve": "CVE-2012-1533",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867187"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-3159.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1533"
},
{
"category": "external",
"summary": "RHBZ#867187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1533",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1533"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (Deployment)"
},
{
"cve": "CVE-2012-1541",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906914"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1541"
},
{
"category": "external",
"summary": "RHBZ#906914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2012-1682",
"discovery_date": "2012-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "853097"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"XMLDecoder security issue via ClassFinder.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1682"
},
{
"category": "external",
"summary": "RHBZ#853097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1682"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html",
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html"
}
],
"release_date": "2012-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)"
},
{
"cve": "CVE-2012-1713",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829361"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1713"
},
{
"category": "external",
"summary": "RHBZ#829361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1713"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)"
},
{
"cve": "CVE-2012-1716",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829360"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1716"
},
{
"category": "external",
"summary": "RHBZ#829360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)"
},
{
"cve": "CVE-2012-1717",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829358"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1717"
},
{
"category": "external",
"summary": "RHBZ#829358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)"
},
{
"cve": "CVE-2012-1718",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829372"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1718"
},
{
"category": "external",
"summary": "RHBZ#829372",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)"
},
{
"cve": "CVE-2012-1719",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829371"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1719"
},
{
"category": "external",
"summary": "RHBZ#829371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)"
},
{
"cve": "CVE-2012-1721",
"discovery_date": "2012-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831353"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1721"
},
{
"category": "external",
"summary": "RHBZ#831353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)"
},
{
"cve": "CVE-2012-1722",
"discovery_date": "2012-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831354"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1721.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1722"
},
{
"category": "external",
"summary": "RHBZ#831354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1722",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1722"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)"
},
{
"cve": "CVE-2012-1725",
"discovery_date": "2012-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "829376"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-1725"
},
{
"category": "external",
"summary": "RHBZ#829376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725"
}
],
"release_date": "2012-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)"
},
{
"cve": "CVE-2012-3143",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867189"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-5089.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (JMX)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3143"
},
{
"category": "external",
"summary": "RHBZ#867189",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (JMX)"
},
{
"cve": "CVE-2012-3159",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867190"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3159"
},
{
"category": "external",
"summary": "RHBZ#867190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3159",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability (Deployment)"
},
{
"cve": "CVE-2012-3213",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907223"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3213"
},
{
"category": "external",
"summary": "RHBZ#907223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)"
},
{
"cve": "CVE-2012-3216",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865346"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3216"
},
{
"category": "external",
"summary": "RHBZ#865346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3216",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3216"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)"
},
{
"cve": "CVE-2012-3342",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906917"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3342"
},
{
"category": "external",
"summary": "RHBZ#906917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2012-4820",
"discovery_date": "2012-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "876386"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, when running under a security manager, allows remote attackers to gain privileges by modifying or removing the security manager via vectors related to \"insecure use of the java.lang.reflect.Method invoke() method.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: java.lang.reflect.Method invoke() code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4820"
},
{
"category": "external",
"summary": "RHBZ#876386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4820",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820"
},
{
"category": "external",
"summary": "http://xforce.iss.net/xforce/xfdb/78764",
"url": "http://xforce.iss.net/xforce/xfdb/78764"
}
],
"release_date": "2012-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: java.lang.reflect.Method invoke() code execution"
},
{
"cve": "CVE-2012-4822",
"discovery_date": "2012-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "876388"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allow remote attackers to execute arbitrary code via vectors related to \"insecure use [of] multiple methods in the java.lang.class class.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: java.lang.class code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4822"
},
{
"category": "external",
"summary": "RHBZ#876388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4822",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4822"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822"
},
{
"category": "external",
"summary": "http://xforce.iss.net/xforce/xfdb/78766",
"url": "http://xforce.iss.net/xforce/xfdb/78766"
}
],
"release_date": "2012-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: java.lang.class code execution"
},
{
"cve": "CVE-2012-4823",
"discovery_date": "2012-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "876389"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allows remote attackers to execute arbitrary code via vectors related to \"insecure use of the java.lang.ClassLoder defineClass() method.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: java.lang.ClassLoder defineClass() code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4823"
},
{
"category": "external",
"summary": "RHBZ#876389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4823",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823"
},
{
"category": "external",
"summary": "http://xforce.iss.net/xforce/xfdb/78767",
"url": "http://xforce.iss.net/xforce/xfdb/78767"
}
],
"release_date": "2012-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: java.lang.ClassLoder defineClass() code execution"
},
{
"cve": "CVE-2012-5068",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865348"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5068"
},
{
"category": "external",
"summary": "RHBZ#865348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5068"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)"
},
{
"cve": "CVE-2012-5069",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865531"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Executors state handling issues (Concurrency, 7189103)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5069"
},
{
"category": "external",
"summary": "RHBZ#865531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5069",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5069"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: Executors state handling issues (Concurrency, 7189103)"
},
{
"cve": "CVE-2012-5071",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865519"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5071"
},
{
"category": "external",
"summary": "RHBZ#865519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5071",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)"
},
{
"cve": "CVE-2012-5072",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865365"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5072"
},
{
"category": "external",
"summary": "RHBZ#865365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5072"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)"
},
{
"cve": "CVE-2012-5073",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865357"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: LogManager security bypass (Libraries, 7169884)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5073"
},
{
"category": "external",
"summary": "RHBZ#865357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5073",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5073"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: LogManager security bypass (Libraries, 7169884)"
},
{
"cve": "CVE-2012-5075",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865363"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5075"
},
{
"category": "external",
"summary": "RHBZ#865363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5075",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5075"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)"
},
{
"cve": "CVE-2012-5079",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865568"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5079"
},
{
"category": "external",
"summary": "RHBZ#865568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5079",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5079"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)"
},
{
"cve": "CVE-2012-5081",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865370"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JSSE denial of service (JSSE, 7186286)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5081"
},
{
"category": "external",
"summary": "RHBZ#865370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5081",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JSSE denial of service (JSSE, 7186286)"
},
{
"cve": "CVE-2012-5083",
"discovery_date": "2012-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "867193"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5083"
},
{
"category": "external",
"summary": "RHBZ#867193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5083",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability (2D)"
},
{
"cve": "CVE-2012-5084",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865511"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5084"
},
{
"category": "external",
"summary": "RHBZ#865511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5084",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5084"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)"
},
{
"cve": "CVE-2012-5089",
"discovery_date": "2012-10-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "865514"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5089"
},
{
"category": "external",
"summary": "RHBZ#865514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5089",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5089"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)"
},
{
"cve": "CVE-2013-0169",
"discovery_date": "2013-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907589"
}
],
"notes": [
{
"category": "description",
"text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SSL/TLS: CBC padding timing attack (lucky-13)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0169"
},
{
"category": "external",
"summary": "RHBZ#907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169"
},
{
"category": "external",
"summary": "http://www.isg.rhul.ac.uk/tls/",
"url": "http://www.isg.rhul.ac.uk/tls/"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20130205.txt",
"url": "http://www.openssl.org/news/secadv_20130205.txt"
},
{
"category": "external",
"summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released",
"url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released"
}
],
"release_date": "2013-02-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
},
{
"category": "workaround",
"details": "On OpenShift Container Platform 3.11 it\u0027s possible to edit the list of cipher suites offered by the router when performing \u0027edge\u0027, or \u0027re-encrypt\u0027 TLS modes. Please follow the documentation [1], and [2] to remove the vulnerable CBC ciphers use the modern, or intermediate cipher suites outlined by Mozilla instead [3]. In \u0027passthrough\u0027 mode TLS termination occurs in the application so that is another way to mitigate the vulnerability.\n[1] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#obtaining-router-configuration-template\n[2] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#using-configmap-replace-template\n[3] https://wiki.mozilla.org/Security/Server_Side_TLS",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SSL/TLS: CBC padding timing attack (lucky-13)"
},
{
"cve": "CVE-2013-0351",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906923"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0351"
},
{
"category": "external",
"summary": "RHBZ#906923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0351"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0401",
"discovery_date": "2013-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "920245"
}
],
"notes": [
{
"category": "description",
"text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0401"
},
{
"category": "external",
"summary": "RHBZ#920245",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)"
},
{
"cve": "CVE-2013-0409",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907226"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0409"
},
{
"category": "external",
"summary": "RHBZ#907226",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)"
},
{
"cve": "CVE-2013-0419",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906918"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0419"
},
{
"category": "external",
"summary": "RHBZ#906918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0423",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906921"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0423"
},
{
"category": "external",
"summary": "RHBZ#906921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0423"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0424",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906813"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0424"
},
{
"category": "external",
"summary": "RHBZ#906813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0424"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)"
},
{
"cve": "CVE-2013-0425",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907344"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0425"
},
{
"category": "external",
"summary": "RHBZ#907344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)"
},
{
"cve": "CVE-2013-0426",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907346"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0426"
},
{
"category": "external",
"summary": "RHBZ#907346",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0426"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)"
},
{
"cve": "CVE-2013-0427",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907455"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0427"
},
{
"category": "external",
"summary": "RHBZ#907455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)"
},
{
"cve": "CVE-2013-0428",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907207"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0428"
},
{
"category": "external",
"summary": "RHBZ#907207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0428"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)"
},
{
"cve": "CVE-2013-0432",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907219"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0432"
},
{
"category": "external",
"summary": "RHBZ#907219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)"
},
{
"cve": "CVE-2013-0433",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907456"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0433"
},
{
"category": "external",
"summary": "RHBZ#907456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0433"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)"
},
{
"cve": "CVE-2013-0434",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907453"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0434"
},
{
"category": "external",
"summary": "RHBZ#907453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)"
},
{
"cve": "CVE-2013-0435",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906892"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0435"
},
{
"category": "external",
"summary": "RHBZ#906892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)"
},
{
"cve": "CVE-2013-0438",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906935"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0438"
},
{
"category": "external",
"summary": "RHBZ#906935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0440",
"discovery_date": "2012-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "859140"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0440"
},
{
"category": "external",
"summary": "RHBZ#859140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)"
},
{
"cve": "CVE-2013-0441",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907458"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing serialization restriction (CORBA, 7201066)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0441"
},
{
"category": "external",
"summary": "RHBZ#907458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing serialization restriction (CORBA, 7201066)"
},
{
"cve": "CVE-2013-0442",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906899"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0442"
},
{
"category": "external",
"summary": "RHBZ#906899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)"
},
{
"cve": "CVE-2013-0443",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907340"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0443"
},
{
"category": "external",
"summary": "RHBZ#907340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)"
},
{
"cve": "CVE-2013-0445",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906900"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0445"
},
{
"category": "external",
"summary": "RHBZ#906900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0445"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)"
},
{
"cve": "CVE-2013-0446",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906916"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0446"
},
{
"category": "external",
"summary": "RHBZ#906916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0446"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-0450",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906911"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0450"
},
{
"category": "external",
"summary": "RHBZ#906911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)"
},
{
"cve": "CVE-2013-0809",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2013-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "917550"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0809"
},
{
"category": "external",
"summary": "RHBZ#917550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0809",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html",
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html"
}
],
"release_date": "2013-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)"
},
{
"cve": "CVE-2013-1473",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906933"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1473"
},
{
"category": "external",
"summary": "RHBZ#906933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1473"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)"
},
{
"cve": "CVE-2013-1476",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907457"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1476"
},
{
"category": "external",
"summary": "RHBZ#907457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)"
},
{
"cve": "CVE-2013-1478",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906894"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1478"
},
{
"category": "external",
"summary": "RHBZ#906894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)"
},
{
"cve": "CVE-2013-1480",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "906904"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1480"
},
{
"category": "external",
"summary": "RHBZ#906904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)"
},
{
"cve": "CVE-2013-1481",
"discovery_date": "2013-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907224"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u39 (Sound)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1481"
},
{
"category": "external",
"summary": "RHBZ#907224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1481",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
}
],
"release_date": "2013-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u39 (Sound)"
},
{
"cve": "CVE-2013-1486",
"discovery_date": "2013-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "913014"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1486"
},
{
"category": "external",
"summary": "RHBZ#913014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)"
},
{
"cve": "CVE-2013-1487",
"discovery_date": "2013-02-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "913030"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1487"
},
{
"category": "external",
"summary": "RHBZ#913030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1487",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html"
}
],
"release_date": "2013-02-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)"
},
{
"cve": "CVE-2013-1491",
"discovery_date": "2013-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "920248"
}
],
"notes": [
{
"category": "description",
"text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to execute arbitrary code via vectors related to 2D, as demonstrated by Joshua Drake during a Pwn2Own competition at CanSecWest 2013.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1491"
},
{
"category": "external",
"summary": "RHBZ#920248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1491",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491"
}
],
"release_date": "2013-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)"
},
{
"cve": "CVE-2013-1493",
"discovery_date": "2013-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "917553"
}
],
"notes": [
{
"category": "description",
"text": "The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1493"
},
{
"category": "external",
"summary": "RHBZ#917553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1493",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1493"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html",
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html"
}
],
"release_date": "2013-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)"
},
{
"acknowledgments": [
{
"names": [
"Tim Brown"
]
}
],
"cve": "CVE-2013-1500",
"discovery_date": "2013-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975148"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Insecure shared memory permissions (2D, 8001034)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1500"
},
{
"category": "external",
"summary": "RHBZ#975148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1500",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1500"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: Insecure shared memory permissions (2D, 8001034)"
},
{
"cve": "CVE-2013-1537",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952387"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform \"dynamic class downloading\" and execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: remote code loading enabled by default (RMI, 8001040)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1537"
},
{
"category": "external",
"summary": "RHBZ#952387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1537",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1537"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: remote code loading enabled by default (RMI, 8001040)"
},
{
"cve": "CVE-2013-1540",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953166"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2433.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1540"
},
{
"category": "external",
"summary": "RHBZ#953166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1540",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1540"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-1557",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952648"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"missing security restrictions\" in the LogStream.setDefaultStream method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1557"
},
{
"category": "external",
"summary": "RHBZ#952648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)"
},
{
"cve": "CVE-2013-1563",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953172"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1563"
},
{
"category": "external",
"summary": "RHBZ#953172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1563"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)"
},
{
"cve": "CVE-2013-1569",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952711"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"checking of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1569"
},
{
"category": "external",
"summary": "RHBZ#952711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1569"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)"
},
{
"acknowledgments": [
{
"names": [
"US-CERT"
]
}
],
"cve": "CVE-2013-1571",
"discovery_date": "2013-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "973474"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1571"
},
{
"category": "external",
"summary": "RHBZ#973474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1571",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1571"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571"
},
{
"category": "external",
"summary": "http://www.kb.cert.org/vuls/id/225657",
"url": "http://www.kb.cert.org/vuls/id/225657"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)"
},
{
"cve": "CVE-2013-2383",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952708"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"handling of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2383"
},
{
"category": "external",
"summary": "RHBZ#952708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2383"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)"
},
{
"cve": "CVE-2013-2384",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952709"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font layout\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2384"
},
{
"category": "external",
"summary": "RHBZ#952709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2384"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)"
},
{
"cve": "CVE-2013-2394",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953265"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2432 and CVE-2013-1491.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2394"
},
{
"category": "external",
"summary": "RHBZ#953265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2394"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)"
},
{
"cve": "CVE-2013-2407",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975127"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"XML security and the class loader.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2407"
},
{
"category": "external",
"summary": "RHBZ#975127",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)"
},
{
"cve": "CVE-2013-2412",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975144"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JConsole SSL support (Serviceability, 8003703)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2412"
},
{
"category": "external",
"summary": "RHBZ#975144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2412"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JConsole SSL support (Serviceability, 8003703)"
},
{
"cve": "CVE-2013-2417",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952657"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2417"
},
{
"category": "external",
"summary": "RHBZ#952657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2417"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)"
},
{
"cve": "CVE-2013-2418",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953267"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2418"
},
{
"category": "external",
"summary": "RHBZ#953267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2419",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952656"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font processing errors\" in the International Components for Unicode (ICU) Layout Engine before 51.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2419"
},
{
"category": "external",
"summary": "RHBZ#952656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)"
},
{
"cve": "CVE-2013-2420",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952638"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient \"validation of images\" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: image processing vulnerability (2D, 8007617)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2420"
},
{
"category": "external",
"summary": "RHBZ#952638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: image processing vulnerability (2D, 8007617)"
},
{
"cve": "CVE-2013-2422",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952642"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2422"
},
{
"category": "external",
"summary": "RHBZ#952642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2422"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)"
},
{
"cve": "CVE-2013-2424",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952509"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient class access checks\" when \"creating new instances\" using MBeanInstantiator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2424"
},
{
"category": "external",
"summary": "RHBZ#952509",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2424"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)"
},
{
"cve": "CVE-2013-2429",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952521"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageWriter state corruption\" when using native code, which triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2429"
},
{
"category": "external",
"summary": "RHBZ#952521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2429"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)"
},
{
"cve": "CVE-2013-2430",
"discovery_date": "2013-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "952524"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageReader state corruption\" when using native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2430"
},
{
"category": "external",
"summary": "RHBZ#952524",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2430"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)"
},
{
"cve": "CVE-2013-2432",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953269"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2394 and CVE-2013-1491.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2432"
},
{
"category": "external",
"summary": "RHBZ#953269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)"
},
{
"cve": "CVE-2013-2433",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953270"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-1540.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2433"
},
{
"category": "external",
"summary": "RHBZ#953270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2433"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2435",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953273"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2435"
},
{
"category": "external",
"summary": "RHBZ#953273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2437",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975773"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Deployment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2437"
},
{
"category": "external",
"summary": "RHBZ#975773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2437"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2440",
"discovery_date": "2013-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "953275"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2435.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2440"
},
{
"category": "external",
"summary": "RHBZ#953275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
}
],
"release_date": "2013-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)"
},
{
"cve": "CVE-2013-2442",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975770"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2466 and CVE-2013-2468.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2442"
},
{
"category": "external",
"summary": "RHBZ#975770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2443",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975137"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect \"checking order\" within the AccessControlContext class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2443"
},
{
"category": "external",
"summary": "RHBZ#975137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)"
},
{
"cve": "CVE-2013-2444",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975131"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not \"properly manage and restrict certain resources related to the processing of fonts,\" possibly involving temporary files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Resource denial of service (AWT, 8001038)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2444"
},
{
"category": "external",
"summary": "RHBZ#975131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2444"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Resource denial of service (AWT, 8001038)"
},
{
"cve": "CVE-2013-2446",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975132"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: output stream access restrictions (CORBA, 8000642)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2446"
},
{
"category": "external",
"summary": "RHBZ#975132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2446"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: output stream access restrictions (CORBA, 8000642)"
},
{
"cve": "CVE-2013-2447",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975140"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket\u0027s local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Prevent revealing the local address (Networking, 8001318)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2447"
},
{
"category": "external",
"summary": "RHBZ#975140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Prevent revealing the local address (Networking, 8001318)"
},
{
"cve": "CVE-2013-2448",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975125"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient \"access restrictions\" and \"robustness of sound classes.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Better access restrictions (Sound, 8006328)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2448"
},
{
"category": "external",
"summary": "RHBZ#975125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2448"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Better access restrictions (Sound, 8006328)"
},
{
"cve": "CVE-2013-2450",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975141"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2450"
},
{
"category": "external",
"summary": "RHBZ#975141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)"
},
{
"cve": "CVE-2013-2451",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975146"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: exclusive port binding (Networking, 7170730)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2451"
},
{
"category": "external",
"summary": "RHBZ#975146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2451"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: exclusive port binding (Networking, 7170730)"
},
{
"cve": "CVE-2013-2452",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975138"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"network address handling in virtual machine identifiers\" and the lack of \"unique and unpredictable IDs\" in the java.rmi.dgc.VMID class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Unique VMIDs (Libraries, 8001033)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2452"
},
{
"category": "external",
"summary": "RHBZ#975138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2452"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Unique VMIDs (Libraries, 8001033)"
},
{
"cve": "CVE-2013-2453",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975134"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for \"package access\" by the MBeanServer Introspector.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2453"
},
{
"category": "external",
"summary": "RHBZ#975134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2453"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)"
},
{
"cve": "CVE-2013-2454",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975129"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2454"
},
{
"category": "external",
"summary": "RHBZ#975129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2454"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)"
},
{
"cve": "CVE-2013-2455",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975139"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: getEnclosing* checks (Libraries, 8007812)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2455"
},
{
"category": "external",
"summary": "RHBZ#975139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2455"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: getEnclosing* checks (Libraries, 8007812)"
},
{
"cve": "CVE-2013-2456",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975142"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2456"
},
{
"category": "external",
"summary": "RHBZ#975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2456"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)"
},
{
"cve": "CVE-2013-2457",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975133"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of \"certain class checks\" that allows remote attackers to bypass intended class restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Proper class checking (JMX, 8008120)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2457"
},
{
"category": "external",
"summary": "RHBZ#975133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2457"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Proper class checking (JMX, 8008120)"
},
{
"cve": "CVE-2013-2459",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975121"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"integer overflow checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2459"
},
{
"category": "external",
"summary": "RHBZ#975121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)"
},
{
"cve": "CVE-2013-2463",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975115"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image attribute verification\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect image attribute verification (2D, 8012438)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2463"
},
{
"category": "external",
"summary": "RHBZ#975115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2463"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect image attribute verification (2D, 8012438)"
},
{
"cve": "CVE-2013-2464",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975757"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, and CVE-2013-2473.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2464"
},
{
"category": "external",
"summary": "RHBZ#975757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2464"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (2D)"
},
{
"cve": "CVE-2013-2465",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975118"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect image channel verification (2D, 8012597)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2465"
},
{
"category": "external",
"summary": "RHBZ#975118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-28T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect image channel verification (2D, 8012597)"
},
{
"cve": "CVE-2013-2466",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975764"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2468.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2466"
},
{
"category": "external",
"summary": "RHBZ#975764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2466"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2468",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975761"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2466.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2468"
},
{
"category": "external",
"summary": "RHBZ#975761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2468"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)"
},
{
"cve": "CVE-2013-2469",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975120"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image layout verification\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect image layout verification (2D, 8012601)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2469"
},
{
"category": "external",
"summary": "RHBZ#975120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2469"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect image layout verification (2D, 8012601)"
},
{
"cve": "CVE-2013-2470",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975099"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"ImagingLib byte lookup processing.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2470"
},
{
"category": "external",
"summary": "RHBZ#975099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2470"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)"
},
{
"cve": "CVE-2013-2471",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975102"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect IntegerComponentRaster size checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2471"
},
{
"category": "external",
"summary": "RHBZ#975102",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)"
},
{
"cve": "CVE-2013-2472",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975107"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ShortBandedRaster size checks\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2472"
},
{
"category": "external",
"summary": "RHBZ#975107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2472"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)"
},
{
"cve": "CVE-2013-2473",
"discovery_date": "2013-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975110"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ByteBandedRaster size checks\" in 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2473"
},
{
"category": "external",
"summary": "RHBZ#975110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2473"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)"
},
{
"cve": "CVE-2013-3743",
"discovery_date": "2013-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "975767"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 45 and earlier and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-3743"
},
{
"category": "external",
"summary": "RHBZ#975767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
}
],
"release_date": "2013-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-23T16:26:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1455"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src",
"5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x",
"5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src",
"6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x",
"6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)"
}
]
}
RHSA-2012:0508
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3557,\nCVE-2011-3560, CVE-2011-3563, CVE-2012-0498, CVE-2012-0499, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507)\n\nAll users of java-1.5.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.5.0 SR13-FP1 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0508",
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0508.json"
}
],
"title": "Red Hat Security Advisory: java-1.5.0-ibm security update",
"tracking": {
"current_release_date": "2025-09-26T03:12:21+00:00",
"generator": {
"date": "2025-09-26T03:12:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2012:0508",
"initial_release_date": "2012-04-23T16:52:00+00:00",
"revision_history": [
{
"date": "2012-04-23T16:52:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-11-14T19:09:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T03:12:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Client-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)",
"product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Server-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"relates_to_product_reference": "6Workstation-Supplementary-6.2.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"discovery_date": "2011-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "737506"
}
],
"notes": [
{
"category": "description",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "RHBZ#737506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
}
],
"release_date": "2011-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)"
},
{
"cve": "CVE-2011-3557",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745464"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3557"
},
{
"category": "external",
"summary": "RHBZ#745464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)"
},
{
"cve": "CVE-2011-3560",
"discovery_date": "2011-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "745379"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3560"
},
{
"category": "external",
"summary": "RHBZ#745379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
],
"release_date": "2011-10-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)"
},
{
"cve": "CVE-2011-3563",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789295"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3563"
},
{
"category": "external",
"summary": "RHBZ#789295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)"
},
{
"cve": "CVE-2012-0498",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790720"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0498"
},
{
"category": "external",
"summary": "RHBZ#790720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0498"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0499",
"discovery_date": "2012-02-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "790722"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0499"
},
{
"category": "external",
"summary": "RHBZ#790722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)"
},
{
"cve": "CVE-2012-0501",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788624"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0501"
},
{
"category": "external",
"summary": "RHBZ#788624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)"
},
{
"cve": "CVE-2012-0502",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789297"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0502"
},
{
"category": "external",
"summary": "RHBZ#789297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)"
},
{
"cve": "CVE-2012-0503",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788976"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0503"
},
{
"category": "external",
"summary": "RHBZ#788976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)"
},
{
"cve": "CVE-2012-0505",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789299"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0505"
},
{
"category": "external",
"summary": "RHBZ#789299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)"
},
{
"cve": "CVE-2012-0506",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "789300"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0506"
},
{
"category": "external",
"summary": "RHBZ#789300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)"
},
{
"cve": "CVE-2012-0507",
"discovery_date": "2012-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "788994"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0507"
},
{
"category": "external",
"summary": "RHBZ#788994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0507"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2012-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-04-23T16:52:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0508"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x",
"5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x",
"6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)"
}
]
}
CERTA-2012-AVI-045
Vulnerability from certfr_avis
Une vulnérabilité présente dans les produits Oracle GlassFish Entreprise Server et Oracle Java System Application Server a été corrigée.
Description
Une vulnérabilité présente dans les produits Oracle GlassFish Entreprise Server et Oracle Java System Application Server permet à un utilisateur malintentionné d'usurper une session utilisateur en récupérant des informations sensibles. La cause de ce problème est l'erreur de conception présente dans les protocoles SSL 3.0 et TLS 1.0.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle GlassFish Entreprise Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java System Application Server 8.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 pr\u00e9sente dans les produits Oracle GlassFish Entreprise\nServer et Oracle Java System Application Server permet \u00e0 un utilisateur\nmalintentionn\u00e9 d\u0027usurper une session utilisateur en r\u00e9cup\u00e9rant des\ninformations sensibles. La cause de ce probl\u00e8me est l\u0027erreur de\nconception pr\u00e9sente dans les protocoles SSL 3.0 et TLS 1.0.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2012-02-01T00:00:00",
"last_revision_date": "2012-02-01T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-045",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-02-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation de l\u0027identit\u00e9 d\u0027un utilisateur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans les produits Oracle GlassFish Entreprise\nServer et Oracle Java System Application Server a \u00e9t\u00e9 corrig\u00e9e.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans des produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Notification de correctifs Oracle",
"url": "http://blogs.oracle.com/sunsecurity/entry/cve_2011_3389_chosen_plaintext2"
}
]
}
CERTA-2011-AVI-580
Vulnerability from certfr_avis
Plusieurs vulnérabilités ont été corrigées dans Oracle Java et permettent d'exécuter du code arbitraire à distance.
Description
Plusieurs vulnérabilités ont été corrigées dans Oracle Java. Certaines d'entre elles permettent à une personne malintentionnée d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle JDK et JRE 6 update 27 et versions antérieures ; | ||
| Oracle | N/A | Oracle FX 2.0 ; | ||
| Oracle | N/A | Oracle JDK et JRE 7 ; | ||
| Oracle | N/A | Oracle JDK et JRE 1.4.2_33 et versions antérieures ; | ||
| Oracle | N/A | Oracle JDK et JRE 5.0 update 31 et versions antérieures ; | ||
| Oracle | N/A | Oracle JRockit R28.1.4 et versions antérieures. |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle JDK et JRE 6 update 27 et versions ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle FX 2.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JDK et JRE 7 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JDK et JRE 1.4.2_33 et versions ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JDK et JRE 5.0 update 31 et versions ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit R28.1.4 et versions ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Oracle Java. Certaines\nd\u0027entre elles permettent \u00e0 une personne malintentionn\u00e9e d\u0027ex\u00e9cuter du\ncode arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"name": "CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"name": "CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"name": "CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"name": "CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"name": "CVE-2011-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3555"
},
{
"name": "CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"name": "CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"name": "CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"name": "CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"name": "CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"name": "CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"name": "CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"name": "CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"name": "CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"name": "CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"name": "CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"name": "CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"name": "CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2011-10-20T00:00:00",
"last_revision_date": "2012-01-31T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple du 08 novembre 2011 :",
"url": "http://support.apple.com/kb/ht5045"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP du 23 janvier 2012\u00a0:",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03122753"
}
],
"reference": "CERTA-2011-AVI-580",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-10-20T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 Apple.",
"revision_date": "2011-11-10T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 HP.",
"revision_date": "2012-01-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Oracle Java et\npermettent d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Java",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 18 octobre 2011",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
}
]
}
CERTA-2011-AVI-567
Vulnerability from certfr_avis
De nombreuses vulnérabilités ont été corrigées dans Apple iOS pour iPhone, iPad et iPod touch dont certaines permettent une exécution de code arbitraire à distance.
Description
De nombreuses vulnérabilités ont été corrigées dans Apple iOS pour iPhone, iPad et iPod touch. Certaines permettent à une personne malintentionnée d'exécuter du code arbitraire à distance ou de récupérer le mot de passe du compte «Apple ID» utilisé. Les composants suivants ont été mise à jour :
- CalDAV ;
- Calendar ;
- CFNetwork ;
- CoreFoundation ;
- CoreGraphics ;
- CoreMedia ;
- ImageIO ;
- International Components for Unicode ;
- Kernel ;
- Keyboards ;
- libxml ;
- OfficeImport ;
- Safari ;
- Settings ;
- UIKit ;
- WebKit ;
- WiFi.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iPod touch avec iOS versions 4.3.5 et ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPhone 4 et 3GS avec iOS versions 4.3.5 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPad avec iOS versions 4.3.5 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Apple iOS pour\niPhone, iPad et iPod touch. Certaines permettent \u00e0 une personne\nmalintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance ou de r\u00e9cup\u00e9rer\nle mot de passe du compte \u00abApple ID\u00bb utilis\u00e9. Les composants suivants\nont \u00e9t\u00e9 mise \u00e0 jour\u00a0:\n\n- CalDAV\u00a0;\n- Calendar\u00a0;\n- CFNetwork\u00a0;\n- CoreFoundation\u00a0;\n- CoreGraphics\u00a0;\n- CoreMedia\u00a0;\n- ImageIO\u00a0;\n- International Components for Unicode\u00a0;\n- Kernel\u00a0;\n- Keyboards\u00a0;\n- libxml\u00a0;\n- OfficeImport\u00a0;\n- Safari\u00a0;\n- Settings\u00a0;\n- UIKit\u00a0;\n- WebKit\u00a0;\n- WiFi.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1204",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1204"
},
{
"name": "CVE-2011-1117",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1117"
},
{
"name": "CVE-2011-0187",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0187"
},
{
"name": "CVE-2011-0983",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0983"
},
{
"name": "CVE-2011-0259",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0259"
},
{
"name": "CVE-2011-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2814"
},
{
"name": "CVE-2011-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0208"
},
{
"name": "CVE-2011-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0192"
},
{
"name": "CVE-2011-2823",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2823"
},
{
"name": "CVE-2011-2813",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2813"
},
{
"name": "CVE-2011-2359",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2359"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2788"
},
{
"name": "CVE-2011-1774",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1774"
},
{
"name": "CVE-2011-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2819"
},
{
"name": "CVE-2011-2799",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2799"
},
{
"name": "CVE-2011-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2341"
},
{
"name": "CVE-2011-0255",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0255"
},
{
"name": "CVE-2011-1190",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1190"
},
{
"name": "CVE-2011-3256",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3256"
},
{
"name": "CVE-2011-1188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1188"
},
{
"name": "CVE-2011-0233",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0233"
},
{
"name": "CVE-2011-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1115"
},
{
"name": "CVE-2011-1296",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1296"
},
{
"name": "CVE-2011-2351",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2351"
},
{
"name": "CVE-2011-2827",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2827"
},
{
"name": "CVE-2011-3432",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3432"
},
{
"name": "CVE-2011-0981",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0981"
},
{
"name": "CVE-2011-3254",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3254"
},
{
"name": "CVE-2011-0254",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0254"
},
{
"name": "CVE-2011-2831",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2831"
},
{
"name": "CVE-2011-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0238"
},
{
"name": "CVE-2011-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2800"
},
{
"name": "CVE-2011-1295",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1295"
},
{
"name": "CVE-2011-3434",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3434"
},
{
"name": "CVE-2011-0222",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0222"
},
{
"name": "CVE-2011-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1121"
},
{
"name": "CVE-2011-1797",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1797"
},
{
"name": "CVE-2011-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2817"
},
{
"name": "CVE-2011-0206",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0206"
},
{
"name": "CVE-2011-1451",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1451"
},
{
"name": "CVE-2011-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2790"
},
{
"name": "CVE-2011-3243",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3243"
},
{
"name": "CVE-2011-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3235"
},
{
"name": "CVE-2011-3237",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3237"
},
{
"name": "CVE-2011-3255",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3255"
},
{
"name": "CVE-2011-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2805"
},
{
"name": "CVE-2011-0232",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0232"
},
{
"name": "CVE-2011-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2356"
},
{
"name": "CVE-2011-3246",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3246"
},
{
"name": "CVE-2011-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2797"
},
{
"name": "CVE-2011-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2339"
},
{
"name": "CVE-2011-1288",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1288"
},
{
"name": "CVE-2011-1132",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1132"
},
{
"name": "CVE-2011-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0241"
},
{
"name": "CVE-2011-1203",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1203"
},
{
"name": "CVE-2011-3245",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3245"
},
{
"name": "CVE-2011-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0242"
},
{
"name": "CVE-2011-2809",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2809"
},
{
"name": "CVE-2011-3261",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3261"
},
{
"name": "CVE-2011-1293",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1293"
},
{
"name": "CVE-2011-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3234"
},
{
"name": "CVE-2011-2338",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2338"
},
{
"name": "CVE-2011-3429",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3429"
},
{
"name": "CVE-2011-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0184"
},
{
"name": "CVE-2011-3431",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3431"
},
{
"name": "CVE-2011-2792",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2792"
},
{
"name": "CVE-2011-0234",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0234"
},
{
"name": "CVE-2011-1449",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1449"
},
{
"name": "CVE-2011-3430",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3430"
},
{
"name": "CVE-2011-3259",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3259"
},
{
"name": "CVE-2011-2818",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2818"
},
{
"name": "CVE-2011-1457",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1457"
},
{
"name": "CVE-2011-0235",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0235"
},
{
"name": "CVE-2011-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0225"
},
{
"name": "CVE-2011-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3236"
},
{
"name": "CVE-2011-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1114"
},
{
"name": "CVE-2011-3427",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3427"
},
{
"name": "CVE-2011-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0166"
},
{
"name": "CVE-2011-2820",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2820"
},
{
"name": "CVE-2011-1109",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1109"
},
{
"name": "CVE-2011-0221",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0221"
},
{
"name": "CVE-2011-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2354"
},
{
"name": "CVE-2011-2816",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2816"
},
{
"name": "CVE-2011-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2352"
},
{
"name": "CVE-2011-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1462"
},
{
"name": "CVE-2011-1453",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1453"
},
{
"name": "CVE-2011-0218",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0218"
},
{
"name": "CVE-2011-3257",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3257"
},
{
"name": "CVE-2011-3244",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3244"
},
{
"name": "CVE-2011-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1107"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2011-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3426"
},
{
"name": "CVE-2011-3260",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3260"
},
{
"name": "CVE-2011-3232",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3232"
},
{
"name": "CVE-2011-3253",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3253"
}
],
"initial_release_date": "2011-10-13T00:00:00",
"last_revision_date": "2011-10-13T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-567",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Apple iOS pour\niPhone, iPad et iPod touch dont certaines permettent une ex\u00e9cution de\ncode arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Apple iOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4999 du 12 octobre 2011",
"url": "http://support.apple.com/kb/HT4999"
}
]
}
CERTA-2013-AVI-243
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Solaris 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Solaris 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Solaris 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1150"
},
{
"name": "CVE-2012-0876",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
},
{
"name": "CVE-2012-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3817"
},
{
"name": "CVE-2012-0845",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0845"
},
{
"name": "CVE-2011-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2013-04-11T00:00:00",
"last_revision_date": "2013-04-11T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-243",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-04-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 10 avril 2013",
"url": "http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"
}
]
}
CERTA-2012-AVI-395
Vulnerability from certfr_avis
Plusieurs vulnérabilités ont été corrigées dans HP Network Node Manager i. Elles permettent à un utilisateur malintentionné de provoquer un déni de service à distance et de porter atteinte à l'intégrité et à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "HP Network Node Manager i 9.0x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP Network Node Manager i 9.1x.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4476"
},
{
"name": "CVE-2011-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3558"
},
{
"name": "CVE-2010-4465",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4465"
},
{
"name": "CVE-2010-4470",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4470"
},
{
"name": "CVE-2012-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0500"
},
{
"name": "CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"name": "CVE-2010-4473",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4473"
},
{
"name": "CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"name": "CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"name": "CVE-2010-0090",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0090"
},
{
"name": "CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"name": "CVE-2010-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0840"
},
{
"name": "CVE-2011-0864",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0864"
},
{
"name": "CVE-2010-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4447"
},
{
"name": "CVE-2011-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0868"
},
{
"name": "CVE-2012-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0507"
},
{
"name": "CVE-2010-0846",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0846"
},
{
"name": "CVE-2010-1321",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1321"
},
{
"name": "CVE-2010-4451",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4451"
},
{
"name": "CVE-2009-3871",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3871"
},
{
"name": "CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"name": "CVE-2010-4452",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4452"
},
{
"name": "CVE-2010-4467",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4467"
},
{
"name": "CVE-2010-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3552"
},
{
"name": "CVE-2010-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3541"
},
{
"name": "CVE-2011-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3554"
},
{
"name": "CVE-2010-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4450"
},
{
"name": "CVE-2011-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3555"
},
{
"name": "CVE-2010-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3558"
},
{
"name": "CVE-2010-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3549"
},
{
"name": "CVE-2009-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3867"
},
{
"name": "CVE-2011-0866",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0866"
},
{
"name": "CVE-2010-4468",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4468"
},
{
"name": "CVE-2010-0844",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0844"
},
{
"name": "CVE-2010-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0841"
},
{
"name": "CVE-2010-0845",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0845"
},
{
"name": "CVE-2010-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3573"
},
{
"name": "CVE-2010-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3572"
},
{
"name": "CVE-2010-3559",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3559"
},
{
"name": "CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"name": "CVE-2010-3571",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3571"
},
{
"name": "CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"name": "CVE-2010-0089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0089"
},
{
"name": "CVE-2011-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0871"
},
{
"name": "CVE-2010-4422",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4422"
},
{
"name": "CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"name": "CVE-2010-0886",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0886"
},
{
"name": "CVE-2010-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4448"
},
{
"name": "CVE-2010-4462",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4462"
},
{
"name": "CVE-2010-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0847"
},
{
"name": "CVE-2010-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3566"
},
{
"name": "CVE-2010-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3560"
},
{
"name": "CVE-2009-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3872"
},
{
"name": "CVE-2011-0786",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0786"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2011-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3544"
},
{
"name": "CVE-2010-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3570"
},
{
"name": "CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"name": "CVE-2011-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0802"
},
{
"name": "CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"name": "CVE-2010-0843",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0843"
},
{
"name": "CVE-2010-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3563"
},
{
"name": "CVE-2010-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3555"
},
{
"name": "CVE-2010-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3556"
},
{
"name": "CVE-2010-0839",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0839"
},
{
"name": "CVE-2010-0849",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0849"
},
{
"name": "CVE-2011-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3561"
},
{
"name": "CVE-2010-4471",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4471"
},
{
"name": "CVE-2010-4454",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4454"
},
{
"name": "CVE-2011-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3551"
},
{
"name": "CVE-2010-0093",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0093"
},
{
"name": "CVE-2010-3569",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3569"
},
{
"name": "CVE-2010-0848",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0848"
},
{
"name": "CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"name": "CVE-2011-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3521"
},
{
"name": "CVE-2011-0862",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0862"
},
{
"name": "CVE-2010-4472",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4472"
},
{
"name": "CVE-2009-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3875"
},
{
"name": "CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"name": "CVE-2010-4463",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4463"
},
{
"name": "CVE-2011-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3553"
},
{
"name": "CVE-2010-3562",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3562"
},
{
"name": "CVE-2009-3869",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3869"
},
{
"name": "CVE-2011-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0865"
},
{
"name": "CVE-2010-0092",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0092"
},
{
"name": "CVE-2010-3568",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3568"
},
{
"name": "CVE-2010-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3548"
},
{
"name": "CVE-2010-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0085"
},
{
"name": "CVE-2010-0095",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0095"
},
{
"name": "CVE-2011-0815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0815"
},
{
"name": "CVE-2011-0817",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0817"
},
{
"name": "CVE-2011-0863",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0863"
},
{
"name": "CVE-2010-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3561"
},
{
"name": "CVE-2010-0091",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0091"
},
{
"name": "CVE-2010-4469",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4469"
},
{
"name": "CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"name": "CVE-2012-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0497"
},
{
"name": "CVE-2011-0873",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0873"
},
{
"name": "CVE-2011-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3516"
},
{
"name": "CVE-2011-0814",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0814"
},
{
"name": "CVE-2010-4475",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4475"
},
{
"name": "CVE-2010-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3567"
},
{
"name": "CVE-2011-0788",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0788"
},
{
"name": "CVE-2010-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3550"
},
{
"name": "CVE-2011-0869",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0869"
},
{
"name": "CVE-2012-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0501"
},
{
"name": "CVE-2012-0504",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0504"
},
{
"name": "CVE-2010-0084",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0084"
},
{
"name": "CVE-2010-4466",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4466"
},
{
"name": "CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"name": "CVE-2010-0887",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0887"
},
{
"name": "CVE-2011-0867",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0867"
},
{
"name": "CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"name": "CVE-2010-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3557"
},
{
"name": "CVE-2009-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3874"
},
{
"name": "CVE-2010-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3565"
},
{
"name": "CVE-2010-0088",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0088"
},
{
"name": "CVE-2010-0842",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0842"
},
{
"name": "CVE-2009-3868",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3868"
},
{
"name": "CVE-2010-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3574"
},
{
"name": "CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"name": "CVE-2010-0837",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0837"
},
{
"name": "CVE-2010-4474",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4474"
},
{
"name": "CVE-2011-3550",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3550"
},
{
"name": "CVE-2009-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3865"
},
{
"name": "CVE-2011-5035",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5035"
},
{
"name": "CVE-2010-3551",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3551"
},
{
"name": "CVE-2010-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3554"
},
{
"name": "CVE-2010-0094",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0094"
},
{
"name": "CVE-2012-0508",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0508"
},
{
"name": "CVE-2010-0082",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0082"
},
{
"name": "CVE-2012-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0498"
},
{
"name": "CVE-2010-0087",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0087"
},
{
"name": "CVE-2011-0872",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0872"
},
{
"name": "CVE-2011-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3546"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2009-3866",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3866"
},
{
"name": "CVE-2010-3553",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3553"
},
{
"name": "CVE-2010-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0838"
},
{
"name": "CVE-2010-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0850"
}
],
"initial_release_date": "2012-07-18T00:00:00",
"last_revision_date": "2012-07-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 HP c03358587 du 16 juillet 2012 :",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03358587"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP c03405642 du 16 juillet 2012 :",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03405642"
}
],
"reference": "CERTA-2012-AVI-395",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eHP\nNetwork Node Manager i\u003c/span\u003e. Elles permettent \u00e0 un utilisateur\nmalintentionn\u00e9 de provoquer un d\u00e9ni de service \u00e0 distance et de porter\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans HP Network Node Manager i",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 HP c03358587 et c03405642 du 16 juillet 2012",
"url": null
}
]
}
CERTFR-2014-AVI-095
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Apple OS X Maverick. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple OS X Mountain Lion versions ant\u00e9rieures \u00e0 10.8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple OS X Lion Server versions ant\u00e9rieures \u00e0 10.7.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple OS X Mavericks versions ant\u00e9rieures \u00e0 10.9.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple OS X Lion versions ant\u00e9rieures \u00e0 10.7.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-1256",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1256"
},
{
"name": "CVE-2013-4073",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4073"
},
{
"name": "CVE-2014-1263",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1263"
},
{
"name": "CVE-2014-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1252"
},
{
"name": "CVE-2014-1258",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1258"
},
{
"name": "CVE-2013-6420",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6420"
},
{
"name": "CVE-2014-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1264"
},
{
"name": "CVE-2014-1261",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1261"
},
{
"name": "CVE-2013-5986",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5986"
},
{
"name": "CVE-2014-1266",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1266"
},
{
"name": "CVE-2014-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1255"
},
{
"name": "CVE-2014-1246",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1246"
},
{
"name": "CVE-2014-1245",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1245"
},
{
"name": "CVE-2013-4248",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4248"
},
{
"name": "CVE-2013-6629",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6629"
},
{
"name": "CVE-2014-1254",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1254"
},
{
"name": "CVE-2013-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5987"
},
{
"name": "CVE-2013-1862",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1862"
},
{
"name": "CVE-2013-5139",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5139"
},
{
"name": "CVE-2014-1259",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1259"
},
{
"name": "CVE-2014-1250",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1250"
},
{
"name": "CVE-2013-4113",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4113"
},
{
"name": "CVE-2014-1265",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1265"
},
{
"name": "CVE-2014-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1247"
},
{
"name": "CVE-2014-1260",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1260"
},
{
"name": "CVE-2014-1262",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1262"
},
{
"name": "CVE-2014-1249",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1249"
},
{
"name": "CVE-2013-5179",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5179"
},
{
"name": "CVE-2013-1896",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1896"
},
{
"name": "CVE-2014-1248",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1248"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2014-1257",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1257"
},
{
"name": "CVE-2013-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5178"
}
],
"initial_release_date": "2014-02-28T00:00:00",
"last_revision_date": "2014-02-28T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-095",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-02-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X Maverick\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun contournement de la politique de s\u00e9curit\u00e9 et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6150 du 25 f\u00e9vrier 2014",
"url": "http://support.apple.com/kb/HT6150"
}
]
}
CERTA-2012-AVI-012
Vulnerability from certfr_avis
Une vulnérabilité des protocoles SSL et TLS implémentés dans les logiciels Microsoft Windows peut porter atteinte à la confidentialité des données.
Description
Une vulnérabilité dans les protocoles SSL 3.0 et TLS 1.0 permet à un attaquant de déchiffrer les informations acheminées. Une solution de contournement avait été proposée par Microsoft en septembre 2011 (CERTA-2011-AVI-541) ; un correctif est maintenant disponible.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Vista Service Pack 2 ; | ||
| Microsoft | Windows | Windows Server 2008 for 32-bit Systems Service Pack 2 ; | ||
| Microsoft | Windows | Windows Server 2003 with SP2 for Itanium-based Systems ; | ||
| Microsoft | Windows | Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1 ; | ||
| Microsoft | Windows | Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1 ; | ||
| Microsoft | Windows | Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1 ; | ||
| Microsoft | Windows | Windows XP Professional x64 Edition Service Pack 2 ; | ||
| Microsoft | Windows | Windows Vista x64 Edition Service Pack 2 ; | ||
| Microsoft | Windows | Windows Server 2008 for Itanium-based Systems Service Pack 2 ; | ||
| Microsoft | Windows | Windows XP Service Pack 3 ; | ||
| Microsoft | Windows | Windows Server 2003 x64 Edition Service Pack 2 ; | ||
| Microsoft | Windows | Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1. | ||
| Microsoft | Windows | Windows Server 2008 for x64-based Systems Service Pack 2 ; | ||
| Microsoft | Windows | Windows Server 2003 Service Pack 2 ; |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Vista Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 for 32-bit Systems Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2003 with SP2 for Itanium-based Systems ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows XP Professional x64 Edition Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Vista x64 Edition Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 for Itanium-based Systems Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows XP Service Pack 3 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2003 x64 Edition Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1.",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 for x64-based Systems Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2003 Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 dans les protocoles SSL 3.0 et TLS 1.0 permet \u00e0 un\nattaquant de d\u00e9chiffrer les informations achemin\u00e9es. Une solution de\ncontournement avait \u00e9t\u00e9 propos\u00e9e par Microsoft en septembre 2011\n(CERTA-2011-AVI-541) ; un correctif est maintenant disponible.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2012-01-11T00:00:00",
"last_revision_date": "2012-01-11T00:00:00",
"links": [
{
"title": "Document du CERTA CERTA-2011-AVI-541 du 29 septembre 2011 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2011-AVI-541/index.html"
}
],
"reference": "CERTA-2012-AVI-012",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 des protocoles SSL et TLS impl\u00e9ment\u00e9s dans les\nlogiciels Microsoft Windows peut porter atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les protocoles SSL/TLS dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS12-006 du 10 janvier 2012",
"url": "http://technet.microsoft.com/en-us/security/bulletin/MS12-006"
}
]
}
CERTA-2012-AVI-512
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Apple OS X. Certaines d'entre elles permettent à un attaquant d'exécuter du code arbitraire à distance au moyen de fichiers spécialement conçus.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Versions ant\u00e9rieures \u00e0 OS X Lion v10.7.5.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Versions ant\u00e9rieures \u00e0 OS X Mountain Lion v10.8.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3048",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3048"
},
{
"name": "CVE-2012-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0053"
},
{
"name": "CVE-2012-3716",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3716"
},
{
"name": "CVE-2012-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2688"
},
{
"name": "CVE-2012-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1667"
},
{
"name": "CVE-2012-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0021"
},
{
"name": "CVE-2012-1173",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1173"
},
{
"name": "CVE-2012-0031",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0031"
},
{
"name": "CVE-2012-1823",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1823"
},
{
"name": "CVE-2012-0671",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0671"
},
{
"name": "CVE-2012-0650",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0650"
},
{
"name": "CVE-2012-3719",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3719"
},
{
"name": "CVE-2012-3721",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3721"
},
{
"name": "CVE-2011-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3607"
},
{
"name": "CVE-2012-0643",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0643"
},
{
"name": "CVE-2012-2311",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2311"
},
{
"name": "CVE-2012-0652",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0652"
},
{
"name": "CVE-2012-3722",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3722"
},
{
"name": "CVE-2011-3368",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
},
{
"name": "CVE-2012-0668",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0668"
},
{
"name": "CVE-2012-0831",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0831"
},
{
"name": "CVE-2011-3026",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3026"
},
{
"name": "CVE-2012-3718",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3718"
},
{
"name": "CVE-2012-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1172"
},
{
"name": "CVE-2011-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
},
{
"name": "CVE-2012-3720",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3720"
},
{
"name": "CVE-2011-4313",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4313"
},
{
"name": "CVE-2012-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2386"
},
{
"name": "CVE-2012-3723",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3723"
},
{
"name": "CVE-2012-0670",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0670"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2012-2143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2143"
},
{
"name": "CVE-2011-4599",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4599"
}
],
"initial_release_date": "2012-09-21T00:00:00",
"last_revision_date": "2012-09-21T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5501 du 19 Septembre 2012 :",
"url": "http://support.apple.com/kb/HT5501"
}
],
"reference": "CERTA-2012-AVI-512",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-09-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance au moyen de\nfichiers sp\u00e9cialement con\u00e7us.\n",
"title": "Multiples Vuln\u00e9rabilit\u00e9s dans Apple OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple du 19 Septembre 2012",
"url": null
}
]
}
CERTA-2013-AVI-575
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle Fusion Middleware. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle WebLogic Server versions 12.1.1.0 et antérieures | ||
| Oracle | N/A | Oracle Security Service versions 11.1.1.6 et antérieures | ||
| Oracle | N/A | Oracle Security Service versions 11.1.2.1 et antérieures | ||
| Oracle | N/A | Oracle Outside In Technology versions 8.4.0 et antérieures | ||
| Oracle | N/A | Oracle Outside In Technology versions 8.4.1 et antérieures | ||
| Oracle | N/A | Oracle Identity Analytics versions 11.1.1.5 et antérieures | ||
| Oracle | N/A | Oracle Identity Manager versions 11.1.2.0.0 et antérieures | ||
| Oracle | N/A | Oracle JDeveloper versions 12.1.2.0.0 et antérieures | ||
| Oracle | N/A | Oracle WebCenter Content versions 10.1.1.7.0 et antérieures | ||
| Oracle | N/A | Oracle Security Service versions 11.1.1.7 et antérieures | ||
| Oracle | N/A | Oracle GlassFish Server versions 3.0.1 et antérieures | ||
| Oracle | N/A | Oracle GlassFish Server versions 3.1.2 et antérieures | ||
| Oracle | N/A | Oracle Identity Manager versions 11.1.2.1.0 et antérieures | ||
| Oracle | N/A | Oracle Web Cache versions 11.1.1.6 et antérieures | ||
| Oracle | N/A | Oracle Web Services versions 10.1.3.5.0 et antérieures | ||
| Oracle | N/A | Oracle Access Manager versions 11.1.2.0.0 et antérieures | ||
| Oracle | N/A | Oracle WebCenter Content versions 10.1.1.8.0 et antérieures | ||
| Oracle | N/A | Oracle Web Cache versions 11.1.1.7 et antérieures | ||
| Oracle | N/A | Oracle WebLogic Server versions 10.3.6.0 et antérieures | ||
| Oracle | N/A | Oracle Portal versions 11.1.1.6.0 et antérieures | ||
| Oracle | N/A | Oracle Access Manager versions 11.1.1.5.0 et antérieures | ||
| Oracle | N/A | Oracle JDeveloper versions 11.1.2.4.0 et antérieures | ||
| Oracle | N/A | Oracle Containers for J2EE versions 10.1.3.5.0 et antérieures | ||
| Oracle | N/A | Oracle Security Service versions 12.2.1 et antérieures | ||
| Oracle | N/A | Oracle GlassFish Server versions 2.1.1 et antérieures | ||
| Oracle | N/A | Oracle JDeveloper versions 11.1.2.3.0 et antérieures | ||
| Oracle | N/A | Oracle Web Services versions 11.1.1.6.0 et antérieures | ||
| Oracle | N/A | Oracle WebCenter Content versions 10.1.1.6.0 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle WebLogic Server versions 12.1.1.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Security Service versions 11.1.1.6 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Security Service versions 11.1.2.1 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Outside In Technology versions 8.4.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Outside In Technology versions 8.4.1 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Identity Analytics versions 11.1.1.5 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Identity Manager versions 11.1.2.0.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JDeveloper versions 12.1.2.0.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebCenter Content versions 10.1.1.7.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Security Service versions 11.1.1.7 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle GlassFish Server versions 3.0.1 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle GlassFish Server versions 3.1.2 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Identity Manager versions 11.1.2.1.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Web Cache versions 11.1.1.6 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Web Services versions 10.1.3.5.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Access Manager versions 11.1.2.0.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebCenter Content versions 10.1.1.8.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Web Cache versions 11.1.1.7 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 10.3.6.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Portal versions 11.1.1.6.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Access Manager versions 11.1.1.5.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JDeveloper versions 11.1.2.4.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Containers for J2EE versions 10.1.3.5.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Security Service versions 12.2.1 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle GlassFish Server versions 2.1.1 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JDeveloper versions 11.1.2.3.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Web Services versions 11.1.1.6.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebCenter Content versions 10.1.1.6.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-5798",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5798"
},
{
"name": "CVE-2013-5816",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5816"
},
{
"name": "CVE-2013-5773",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5773"
},
{
"name": "CVE-2013-3828",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3828"
},
{
"name": "CVE-2013-3836",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3836"
},
{
"name": "CVE-2013-3624",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3624"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2013-5813",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5813"
},
{
"name": "CVE-2013-3827",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3827"
},
{
"name": "CVE-2013-5815",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5815"
},
{
"name": "CVE-2013-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2172"
},
{
"name": "CVE-2013-5791",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5791"
},
{
"name": "CVE-2013-3831",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3831"
},
{
"name": "CVE-2013-3833",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3833"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2013-10-16T00:00:00",
"last_revision_date": "2013-10-16T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-575",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-10-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Fusion Middleware\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une atteinte\n\u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Fusion Middleware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle CPUOct2013 du 16 octobre 2013",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
}
]
}
CERTA-2012-AVI-499
Vulnerability from certfr_avis
Une vulnérabilité a été corrigée dans RSA BSAFE Micro Edition Suite. Elle concerne une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
RSA BSAFE Micro Edition Suite versions antérieures à 4.0.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eRSA BSAFE Micro Edition Suite versions ant\u00e9rieures \u00e0 4.0.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2012-09-13T00:00:00",
"last_revision_date": "2012-09-13T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-499",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-09-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eRSA BSAFE\nMicro Edition Suite\u003c/span\u003e. Elle concerne une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans RSA BSAFE Micro Edition Suite",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ESA-2012-032 du 11 septembre 2012",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/att-0040/ESA-2012-032.txt"
}
]
}
CERTFR-2014-AVI-154
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans EMC VPLEX GeoSynchrony. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
VPLEX GeoSynchrony version 4.0 à 5.2.1
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVPLEX GeoSynchrony version 4.0 \u00e0 5.2.1\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2002-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-2443"
},
{
"name": "CVE-2012-5166",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5166"
},
{
"name": "CVE-2012-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2136"
},
{
"name": "CVE-2013-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1667"
},
{
"name": "CVE-2011-1044",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1044"
},
{
"name": "CVE-2014-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0635"
},
{
"name": "CVE-2011-4110",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4110"
},
{
"name": "CVE-2014-0633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0633"
},
{
"name": "CVE-2014-0632",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0632"
},
{
"name": "CVE-2012-0814",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0814"
},
{
"name": "CVE-2014-0634",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0634"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2014-04-01T00:00:00",
"last_revision_date": "2014-04-01T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-154",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-04-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eEMC VPLEX GeoSynchrony\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9, une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans EMC VPLEX GeoSynchrony",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 EMC ESA-2014-016 du 26 mars 2014",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-03/att-0157/ESA-2014-016.txt"
}
]
}
CERTFR-2019-AVI-014
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Centreon | Web | SRC Series Application Server et Web Administrator versions antérieures à 4.12.0-R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 sur vMX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75 | ||
| N/A | N/A | Juniper ATP | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series | ||
| Juniper Networks | Junos Space | Junos Space | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series | ||
| Juniper Networks | Junos OS | Tous produits et toutes plateformes exécutant Junos OS | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SRC Series Application Server et Web Administrator versions ant\u00e9rieures \u00e0 4.12.0-R1",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 sur vMX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper ATP",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Tous produits et toutes plateformes ex\u00e9cutant Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0010"
},
{
"name": "CVE-2018-10901",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10901"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2019-0003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0003"
},
{
"name": "CVE-2019-0007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0007"
},
{
"name": "CVE-2018-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2019-0027",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0027"
},
{
"name": "CVE-2019-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0030"
},
{
"name": "CVE-2017-1000379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379"
},
{
"name": "CVE-2019-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0001"
},
{
"name": "CVE-2018-14634",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14634"
},
{
"name": "CVE-2019-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0002"
},
{
"name": "CVE-2019-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0013"
},
{
"name": "CVE-2019-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0023"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2017-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3137"
},
{
"name": "CVE-2015-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1283"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2017-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3142"
},
{
"name": "CVE-2018-10872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10872"
},
{
"name": "CVE-2019-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0015"
},
{
"name": "CVE-2019-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0005"
},
{
"name": "CVE-2019-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0009"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2019-0024",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0024"
},
{
"name": "CVE-2019-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0025"
},
{
"name": "CVE-2017-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3143"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2019-0011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0011"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"name": "CVE-2019-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0012"
},
{
"name": "CVE-2017-11610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11610"
},
{
"name": "CVE-2018-5748",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5748"
},
{
"name": "CVE-2019-0004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0004"
},
{
"name": "CVE-2019-0017",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0017"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2019-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0021"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2019-0016",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0016"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2019-0022",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0022"
},
{
"name": "CVE-2017-1000364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-1050",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1050"
},
{
"name": "CVE-2019-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0014"
},
{
"name": "CVE-2018-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3693"
},
{
"name": "CVE-2018-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10911"
},
{
"name": "CVE-2019-0026",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0026"
},
{
"name": "CVE-2019-0029",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0029"
},
{
"name": "CVE-2019-0020",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0020"
},
{
"name": "CVE-2018-5740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5740"
},
{
"name": "CVE-2017-2619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2619"
},
{
"name": "CVE-2019-0018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0018"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2019-0006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0006"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2017-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3136"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2017-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3145"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-10301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10301"
}
],
"initial_release_date": "2019-01-10T00:00:00",
"last_revision_date": "2019-01-10T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-014",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10906 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10906\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10910 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10910\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10911 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10911\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10907 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10907\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10912 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10912\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10913 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10913\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10919 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10919\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10905 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10905\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10902 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10902\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10917 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10917\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10904 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10904\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10915 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10915\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10916 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10916\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10914 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10914\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10900 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10900\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10909 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10909\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10901 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10901\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10918 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10918\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10903 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10903\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTA-2012-AVI-054
Vulnerability from certfr_avis
Plusieurs vulnérabilités sont présentes dans Mac OS X Lion.
Description
Plusieurs vulnérabilités existent dans Mac OS X Lion dont certaines, particulièrement critiques, permettent à une personne malintentionnée d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Mac OS X Lion, versions antérieures à 10.7.3.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eMac OS X Lion, versions ant\u00e9rieures \u00e0 10.7.3.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s existent dans Mac OS X Lion dont certaines,\nparticuli\u00e8rement critiques, permettent \u00e0 une personne malintentionn\u00e9e\nd\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2011-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2202"
},
{
"name": "CVE-2011-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2483"
},
{
"name": "CVE-2011-0200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0200"
},
{
"name": "CVE-2011-3459",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3459"
},
{
"name": "CVE-2011-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3348"
},
{
"name": "CVE-2010-4555",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4555"
},
{
"name": "CVE-2011-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3446"
},
{
"name": "CVE-2011-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3182"
},
{
"name": "CVE-2011-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3268"
},
{
"name": "CVE-2011-3453",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3453"
},
{
"name": "CVE-2010-2813",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2813"
},
{
"name": "CVE-2011-3256",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3256"
},
{
"name": "CVE-2011-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3444"
},
{
"name": "CVE-2011-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3450"
},
{
"name": "CVE-2011-1657",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1657"
},
{
"name": "CVE-2011-3422",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3422"
},
{
"name": "CVE-2011-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3449"
},
{
"name": "CVE-2011-3328",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3328"
},
{
"name": "CVE-2011-3249",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3249"
},
{
"name": "CVE-2011-3267",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3267"
},
{
"name": "CVE-2011-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1921"
},
{
"name": "CVE-2011-3448",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3448"
},
{
"name": "CVE-2011-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1148"
},
{
"name": "CVE-2011-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3441"
},
{
"name": "CVE-2011-1783",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1783"
},
{
"name": "CVE-2010-4554",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4554"
},
{
"name": "CVE-2011-3246",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3246"
},
{
"name": "CVE-2011-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0241"
},
{
"name": "CVE-2011-3452",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3452"
},
{
"name": "CVE-2011-2192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2192"
},
{
"name": "CVE-2011-3460",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3460"
},
{
"name": "CVE-2011-3252",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3252"
},
{
"name": "CVE-2011-3248",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3248"
},
{
"name": "CVE-2011-3457",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3457"
},
{
"name": "CVE-2011-3463",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3463"
},
{
"name": "CVE-2011-2937",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2937"
},
{
"name": "CVE-2011-3458",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3458"
},
{
"name": "CVE-2011-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1752"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3462",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3462"
},
{
"name": "CVE-2010-1637",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1637"
},
{
"name": "CVE-2011-2204",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2204"
},
{
"name": "CVE-2011-3250",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3250"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2011-2023",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2023"
},
{
"name": "CVE-2011-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1938"
},
{
"name": "CVE-2011-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3447"
},
{
"name": "CVE-2011-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3189"
}
],
"initial_release_date": "2012-02-03T00:00:00",
"last_revision_date": "2012-02-03T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-054",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-02-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans \u003cspan class=\"textit\"\u003eMac OS\nX Lion\u003c/span\u003e.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5130 du 01 f\u00e9vrier 2012",
"url": "http://support.apple.com/kb/HT5130"
}
]
}
CERTA-2011-AVI-541
Vulnerability from certfr_avis
Une vulnérabilité des protocoles SSL et TLS implémentés dans les logiciels Microsoft Windows peut porter atteinte à la confidentialité des données.
Description
Une vulnérabilité dans les protocoles SSL 3.0 et TLS 1.0 permet à un attaquant de déchiffrer les informations acheminées.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Vista Service Pack 2 ; | ||
| Microsoft | Windows | Windows Server 2008 for 32-bit Systems Service Pack 2 ; | ||
| Microsoft | Windows | Windows Server 2003 with SP2 for Itanium-based Systems ; | ||
| Microsoft | Windows | Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1 ; | ||
| Microsoft | Windows | Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1 ; | ||
| Microsoft | Windows | Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1 ; | ||
| Microsoft | Windows | Windows XP Professional x64 Edition Service Pack 2 ; | ||
| Microsoft | Windows | Windows Vista x64 Edition Service Pack 2 ; | ||
| Microsoft | Windows | Windows Server 2008 for Itanium-based Systems Service Pack 2 ; | ||
| Microsoft | Windows | Windows XP Service Pack 3 ; | ||
| Microsoft | Windows | Windows Server 2003 x64 Edition Service Pack 2 ; | ||
| Microsoft | Windows | Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1. | ||
| Microsoft | Windows | Windows Server 2008 for x64-based Systems Service Pack 2 ; | ||
| Microsoft | Windows | Windows Server 2003 Service Pack 2 ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Vista Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 for 32-bit Systems Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2003 with SP2 for Itanium-based Systems ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows XP Professional x64 Edition Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Vista x64 Edition Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 for Itanium-based Systems Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows XP Service Pack 3 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2003 x64 Edition Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1.",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 for x64-based Systems Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2003 Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 dans les protocoles SSL 3.0 et TLS 1.0 permet \u00e0 un\nattaquant de d\u00e9chiffrer les informations achemin\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2011-09-29T00:00:00",
"last_revision_date": "2011-09-29T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-541",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-09-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 des protocoles SSL et TLS impl\u00e9ment\u00e9s dans les\nlogiciels Microsoft Windows peut porter atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les protocoles SSL/TLS dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 Microsoft 2588513 du 28 septembre 2011",
"url": "http://technet.microsoft.com/fr-fr/security/advisory/2588513"
}
]
}
CERTA-2013-AVI-601
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Apple OS X Mavericks. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un contournement de la politique de sécurité et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à OS X Mavericks v10.9
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 OS X Mavericks v10.9\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5188"
},
{
"name": "CVE-2013-4073",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4073"
},
{
"name": "CVE-2013-0249",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0249"
},
{
"name": "CVE-2013-5190",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5190"
},
{
"name": "CVE-2013-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1667"
},
{
"name": "CVE-2013-5167",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5167"
},
{
"name": "CVE-2013-5172",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5172"
},
{
"name": "CVE-2013-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1944"
},
{
"name": "CVE-2013-5182",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5182"
},
{
"name": "CVE-2013-5191",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5191"
},
{
"name": "CVE-2013-5175",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5175"
},
{
"name": "CVE-2013-3954",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3954"
},
{
"name": "CVE-2012-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1150"
},
{
"name": "CVE-2013-5174",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5174"
},
{
"name": "CVE-2013-5186",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5186"
},
{
"name": "CVE-2013-5176",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5176"
},
{
"name": "CVE-2013-5170",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5170"
},
{
"name": "CVE-2012-0876",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
},
{
"name": "CVE-2013-5135",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5135"
},
{
"name": "CVE-2013-5187",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5187"
},
{
"name": "CVE-2013-5192",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5192"
},
{
"name": "CVE-2013-5184",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5184"
},
{
"name": "CVE-2012-0845",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0845"
},
{
"name": "CVE-2013-5185",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5185"
},
{
"name": "CVE-2013-5183",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5183"
},
{
"name": "CVE-2013-5168",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5168"
},
{
"name": "CVE-2013-5145",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5145"
},
{
"name": "CVE-2013-5173",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5173"
},
{
"name": "CVE-2013-5142",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5142"
},
{
"name": "CVE-2013-5166",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5166"
},
{
"name": "CVE-2013-5169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5169"
},
{
"name": "CVE-2013-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5189"
},
{
"name": "CVE-2013-5177",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5177"
},
{
"name": "CVE-2013-5141",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5141"
},
{
"name": "CVE-2013-5139",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5139"
},
{
"name": "CVE-2013-3950",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3950"
},
{
"name": "CVE-2013-5180",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5180"
},
{
"name": "CVE-2013-5171",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5171"
},
{
"name": "CVE-2013-5181",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5181"
},
{
"name": "CVE-2013-5165",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5165"
},
{
"name": "CVE-2011-3427",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3427"
},
{
"name": "CVE-2011-4944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4944"
},
{
"name": "CVE-2013-5179",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5179"
},
{
"name": "CVE-2013-5138",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5138"
},
{
"name": "CVE-2011-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2391"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2013-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5178"
}
],
"initial_release_date": "2013-10-24T00:00:00",
"last_revision_date": "2013-10-24T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-601",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-10-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X Mavericks\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire, un\ncontournement de la politique de s\u00e9curit\u00e9 et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X Mavericks",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6011 du 22 octobre 2013",
"url": "http://support.apple.com/kb/HT6011"
}
]
}
CERTA-2013-AVI-367
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans EMC RSA BSAFE. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | RSA BSAFE Micro Edition Suite versions antérieures à 3.2.5 | ||
| N/A | N/A | RSA BSAFE SSL-J versions antérieures à 5.1.2 | ||
| N/A | N/A | RSA BSAFE SSL-J versions antérieures à 6.0.1 | ||
| N/A | N/A | RSA BSAFE SSL-C versions antérieures à 2.8.7 | ||
| N/A | N/A | RSA BSAFE Micro Edition Suite versions antérieures à 4.0.3 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "RSA BSAFE Micro Edition Suite versions ant\u00e9rieures \u00e0 3.2.5",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "RSA BSAFE SSL-J versions ant\u00e9rieures \u00e0 5.1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "RSA BSAFE SSL-J versions ant\u00e9rieures \u00e0 6.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "RSA BSAFE SSL-C versions ant\u00e9rieures \u00e0 2.8.7",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "RSA BSAFE Micro Edition Suite versions ant\u00e9rieures \u00e0 4.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2013-06-20T00:00:00",
"last_revision_date": "2013-06-20T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-367",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-06-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eEMC RSA BSAFE\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans EMC RSA BSAFE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 EMC ESA-2013-045 du 19 juin 2013",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-06/att-0065/ESA-2013-045.txt"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 EMC ESA-2013-032 du 19 juin 2013",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-06/att-0067/ESA-2013-032.txt"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 EMC ESA-2013-039 du 19 juin 2013",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-06/att-0066/ESA-2013-039.txt"
}
]
}
CERTA-2012-AVI-286
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans HP-UX. Elles affectent l'environnement JAVA JRE et JDK ainsi que OpenSSL. Les failles sont majoritairement des dénis de service mais sont également présents des modifications de données et des accès non autorisés aux données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "HP-UX B.11.31.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP-UX B.11.23 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP-UX B.11.11 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4476"
},
{
"name": "CVE-2010-4465",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4465"
},
{
"name": "CVE-2012-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0502"
},
{
"name": "CVE-2010-4473",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4473"
},
{
"name": "CVE-2011-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3556"
},
{
"name": "CVE-2011-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3545"
},
{
"name": "CVE-2011-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3548"
},
{
"name": "CVE-2011-0864",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0864"
},
{
"name": "CVE-2010-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4447"
},
{
"name": "CVE-2011-4619",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4619"
},
{
"name": "CVE-2012-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
},
{
"name": "CVE-2012-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0505"
},
{
"name": "CVE-2011-3552",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3552"
},
{
"name": "CVE-2012-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0499"
},
{
"name": "CVE-2011-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0871"
},
{
"name": "CVE-2011-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3560"
},
{
"name": "CVE-2010-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4448"
},
{
"name": "CVE-2010-4462",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4462"
},
{
"name": "CVE-2012-0884",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0884"
},
{
"name": "CVE-2006-7250",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7250"
},
{
"name": "CVE-2012-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0506"
},
{
"name": "CVE-2011-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0802"
},
{
"name": "CVE-2012-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0503"
},
{
"name": "CVE-2012-1165",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1165"
},
{
"name": "CVE-2010-4454",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4454"
},
{
"name": "CVE-2011-0862",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0862"
},
{
"name": "CVE-2011-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3563"
},
{
"name": "CVE-2011-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0865"
},
{
"name": "CVE-2011-0815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0815"
},
{
"name": "CVE-2010-4469",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4469"
},
{
"name": "CVE-2011-0814",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0814"
},
{
"name": "CVE-2010-4475",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4475"
},
{
"name": "CVE-2011-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3557"
},
{
"name": "CVE-2011-0867",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0867"
},
{
"name": "CVE-2011-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3549"
},
{
"name": "CVE-2011-3547",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3547"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2012-2131",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2131"
}
],
"initial_release_date": "2012-05-18T00:00:00",
"last_revision_date": "2012-05-18T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-286",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-05-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHP-UX\u003c/span\u003e. Elles affectent l\u0027environnement JAVA \u003cspan\nclass=\"textit\"\u003eJRE\u003c/span\u003e et \u003cspan class=\"textit\"\u003eJDK\u003c/span\u003e ainsi que\n\u003cspan class=\"textit\"\u003eOpenSSL\u003c/span\u003e. Les failles sont majoritairement\ndes d\u00e9nis de service mais sont \u00e9galement pr\u00e9sents des modifications de\ndonn\u00e9es et des acc\u00e8s non autoris\u00e9s aux donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP-UX",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP-UX c03316985 du 15 mai 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03316985"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP-UX c03333987 du 17 mai 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03316985"
}
]
}
CERTA-2012-AVI-498
Vulnerability from certfr_avis
Plusieurs vulnérabilités ont été corrigées dans RSA BSAFE SSL-C. Elles concernent une atteinte à la confidentialité des données, un déni de service et éventuellement une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Toutes les versions de RSA BSAFE SSL-C antérieures à 2.8.6.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eToutes les versions de RSA BSAFE SSL-C ant\u00e9rieures \u00e0 2.8.6.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2012-2131",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2131"
}
],
"initial_release_date": "2012-09-13T00:00:00",
"last_revision_date": "2012-09-13T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-498",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-09-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eRSA\nBSAFE SSL-C\u003c/span\u003e. Elles concernent une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, un d\u00e9ni de service et \u00e9ventuellement une ex\u00e9cution de code\narbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans RSA BSAFE SSL-C",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ESA-2012-029 du 11 septembre 2012",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/att-0046/ESA-2012-029.txt"
}
]
}
CERTFR-2019-AVI-311
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIPROTEC 5 types 6MD85, 6MD86,6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87,7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86,7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82,7UT85, 7UT86, 7UT87 et 7VE85 versions antérieures à V7.90 | ||
| Siemens | N/A | Spectrum Power 3, 4, 5 et 7 | ||
| Siemens | N/A | SIMATIC WinCC V7.4 versions antérieures à V7.4 SP1 Upd 11 | ||
| Siemens | N/A | RAPIDPoint 500 | ||
| Siemens | N/A | SIMATIC IPC627E avec un BIOS d'une version antérieure à V25.02.04 | ||
| Siemens | N/A | SIMATIC PCS 7 V8.2 avec WinCC versions antérieures à V7.4 SP1 Upd 11 | ||
| Siemens | N/A | SENSIS Dell High-End Server (VC12), Mat. Nr.10910620: versions antérieures à VC12M sans le correctif AX037/19/P | ||
| Siemens | N/A | Sensis SIS Server Machine, Mat. Nr. 06648153: versions antérieures à VC11D, VC12M, VD11B sans le correctif AX037/19/P | ||
| Siemens | N/A | SIMATIC RF68XR versions antérieures à V3.2.1 | ||
| Siemens | N/A | SIMATIC IPC427E avec un BIOS d'une version antérieure à V21.01.11 | ||
| Siemens | N/A | SIMATIC IPC647E avec un BIOS d'une version antérieure à V25.02.04 | ||
| Siemens | N/A | TIA Administrator versions antérieures à V1.0 SP1 Upd1 | ||
| Siemens | N/A | SIMATIC WinCC V7.5 versions antérieures à V7.5 Upd 3 | ||
| Siemens | N/A | SIMATIC IPC847E avec un BIOS d'une version antérieure à V25.02.04 | ||
| Siemens | N/A | SIMATIC IPC677E avec un BIOS d'une version antérieure à V25.02.04 | ||
| Siemens | N/A | SIMATIC RF615R versions antérieures à V3.2.1 | ||
| Siemens | N/A | SIMATIC IPC477E Pro avec un BIOS d'une version antérieure à V21.01.11 | ||
| Siemens | N/A | Sensis High End SIS Server, Mat. Nr. 10140973: versions antérieures à VC11D, VC12M sans le correctif AX037/19/P | ||
| Siemens | N/A | SIMATIC IPC477E avec un BIOS d'une version antérieure à V21.01.11 | ||
| Siemens | N/A | DIGSI 5 versions antérieures à V7.90 | ||
| Siemens | N/A | SIMATIC PCS 7 V9.0 avec WinCC versions antérieures à V7.4 SP1 Upd 11 | ||
| Siemens | N/A | VM SIS Virtual Server, Mat. Nr. 10765502: versions antérieures à VC12M sans le correctif AX037/19/P |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIPROTEC 5 types 6MD85, 6MD86,6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87,7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86,7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82,7UT85, 7UT86, 7UT87 et 7VE85 versions ant\u00e9rieures \u00e0 V7.90",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Spectrum Power 3, 4, 5 et 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.4 versions ant\u00e9rieures \u00e0 V7.4 SP1 Upd 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RAPIDPoint 500",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC627E avec un BIOS d\u0027une version ant\u00e9rieure \u00e0 V25.02.04",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V8.2 avec WinCC versions ant\u00e9rieures \u00e0 V7.4 SP1 Upd 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENSIS Dell High-End Server (VC12), Mat. Nr.10910620: versions ant\u00e9rieures \u00e0 VC12M sans le correctif AX037/19/P",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Sensis SIS Server Machine, Mat. Nr. 06648153: versions ant\u00e9rieures \u00e0 VC11D, VC12M, VD11B sans le correctif AX037/19/P",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF68XR versions ant\u00e9rieures \u00e0 V3.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC427E avec un BIOS d\u0027une version ant\u00e9rieure \u00e0 V21.01.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC647E avec un BIOS d\u0027une version ant\u00e9rieure \u00e0 V25.02.04",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Administrator versions ant\u00e9rieures \u00e0 V1.0 SP1 Upd1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.5 versions ant\u00e9rieures \u00e0 V7.5 Upd 3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC847E avec un BIOS d\u0027une version ant\u00e9rieure \u00e0 V25.02.04",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC677E avec un BIOS d\u0027une version ant\u00e9rieure \u00e0 V25.02.04",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC RF615R versions ant\u00e9rieures \u00e0 V3.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC477E Pro avec un BIOS d\u0027une version ant\u00e9rieure \u00e0 V21.01.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Sensis High End SIS Server, Mat. Nr. 10140973: versions ant\u00e9rieures \u00e0 VC11D, VC12M sans le correctif AX037/19/P",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC477E avec un BIOS d\u0027une version ant\u00e9rieure \u00e0 V21.01.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "DIGSI 5 versions ant\u00e9rieures \u00e0 V7.90",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.0 avec WinCC versions ant\u00e9rieures \u00e0 V7.4 SP1 Upd 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "VM SIS Virtual Server, Mat. Nr. 10765502: versions ant\u00e9rieures \u00e0 VC12M sans le correctif AX037/19/P",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2016-6329",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6329"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2019-10930",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10930"
},
{
"name": "CVE-2019-10915",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10915"
},
{
"name": "CVE-2019-10931",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10931"
},
{
"name": "CVE-2019-10935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10935"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-10933",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10933"
},
{
"name": "CVE-2019-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0708"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2019-07-09T00:00:00",
"last_revision_date": "2019-07-09T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-311",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-166360 du 09 juillet 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-616199 du 09 juillet 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-121293 du 09 juillet 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-121293.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-721298 du 09 juillet 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-721298.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-616472 du 09 juillet 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-747162 du 09 juillet 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-747162.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-899560 du 09 juillet 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-899560.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-556833 du 09 juillet 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
}
]
}
CERTA-2012-AVI-272
Vulnerability from certfr_avis
Trente-six vulnérabilités ont été corrigées dans OS X Lion. Il est possible d'exécuter du code arbitraire à distance, d'exécuter du code en local, d'obtenir des données sensibles et d'élever ses privilèges. De nombreuses applications et fonctions sont touchées, toutes sont décrites dans le bulletin Apple référencé dans la section « Documentation ».
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à OS X Lion v10.7.4.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 OS X Lion v10.7.4.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2012-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0675"
},
{
"name": "CVE-2012-0649",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0649"
},
{
"name": "CVE-2012-0661",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0661"
},
{
"name": "CVE-2012-0658",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0658"
},
{
"name": "CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"name": "CVE-2011-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2692"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2011-3328",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3328"
},
{
"name": "CVE-2012-0659",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0659"
},
{
"name": "CVE-2011-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3212"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"name": "CVE-2012-0657",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0657"
},
{
"name": "CVE-2012-0652",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0652"
},
{
"name": "CVE-2011-1778",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1778"
},
{
"name": "CVE-2011-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0241"
},
{
"name": "CVE-2012-0660",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0660"
},
{
"name": "CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"name": "CVE-2012-0036",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0036"
},
{
"name": "CVE-2012-0662",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0662"
},
{
"name": "CVE-2012-0655",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0655"
},
{
"name": "CVE-2012-0642",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0642"
},
{
"name": "CVE-2011-4566",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4566"
},
{
"name": "CVE-2011-1777",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1777"
},
{
"name": "CVE-2011-4885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2012-0651",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0651"
},
{
"name": "CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"name": "CVE-2012-0830",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0830"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0656",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0656"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2012-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1182"
},
{
"name": "CVE-2012-0870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0870"
},
{
"name": "CVE-2012-0654",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0654"
}
],
"initial_release_date": "2012-05-10T00:00:00",
"last_revision_date": "2012-05-10T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-272",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Trente-six vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eOS\nX Lion\u003c/span\u003e. Il est possible d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance,\nd\u0027ex\u00e9cuter du code en local, d\u0027obtenir des donn\u00e9es sensibles et d\u0027\u00e9lever\nses privil\u00e8ges. De nombreuses applications et fonctions sont touch\u00e9es,\ntoutes sont d\u00e9crites dans le bulletin \u003cspan class=\"textit\"\u003eApple\u003c/span\u003e\nr\u00e9f\u00e9renc\u00e9 dans la section \u00ab Documentation \u00bb.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans OS X Lion",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5281 du 09 mai 2012",
"url": "https://support.apple.com/kb/HT5281"
}
]
}
CERTA-2012-AVI-190
Vulnerability from certfr_avis
Deux vulnérabilités ont été corrigées dans curl. La première concerne une vulnérabilité liée à OpenSSL et l'utilisation de SSL_OP_ALL. La seconde affecte le traitement des URL.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Versions ant\u00e9rieures \u00e0 7.21.0-2.1+squeeze2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Versions ant\u00e9rieures \u00e0 7.24.0-1.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Versions ant\u00e9rieures \u00e0 7.18.2-8lenny6 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-0036",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0036"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2012-04-05T00:00:00",
"last_revision_date": "2012-04-05T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 2398 du 31 mars 2012 :",
"url": "http://www.debian.org/security/2012/dsa-2398"
}
],
"reference": "CERTA-2012-AVI-190",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-04-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ecurl\u003c/span\u003e. La premi\u00e8re concerne une vuln\u00e9rabilit\u00e9 li\u00e9e\n\u00e0 \u003cspan class=\"textit\"\u003eOpenSSL\u003c/span\u003e et l\u0027utilisation de \u003cspan\nclass=\"textit\"\u003eSSL_OP_ALL\u003c/span\u003e. La seconde affecte le traitement des\n\u003cspan class=\"textit\"\u003eURL\u003c/span\u003e.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans curl",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-2398 du 31 mars 2012",
"url": null
}
]
}
CERTA-2011-AVI-675
Vulnerability from certfr_avis
Plusieurs vulnérabilités dans Opera permettent à un utilisateur malveillant de contourner la politique de sécurité et de lire des données sans droit.
Description
Plusieurs vulnérabilités affectent Opera :
- la politique de séparation des domaines n'est pas correctement mise en pratique. Des scripts provenant d'un serveur web peuvent capter des informations sur l'activité de l'utilisateur avec d'autres sites web ;
- la gestion des domaines présente une erreur qui permet le positionnement de cookies et des communications interdomaines illégitimes ;
- une attaque par interposition est possible sur le protocole SSL/TLS.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Opera 11.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eOpera 11.x.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s affectent Opera\u00a0:\n\n- la politique de s\u00e9paration des domaines n\u0027est pas correctement mise\n en pratique. Des scripts provenant d\u0027un serveur web peuvent capter\n des informations sur l\u0027activit\u00e9 de l\u0027utilisateur avec d\u0027autres sites\n web\u00a0;\n- la gestion des domaines pr\u00e9sente une erreur qui permet le\n positionnement de cookies et des communications interdomaines\n ill\u00e9gitimes\u00a0;\n- une attaque par interposition est possible sur le protocole SSL/TLS.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
}
],
"initial_release_date": "2011-12-07T00:00:00",
"last_revision_date": "2011-12-07T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-675",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-12-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans Opera permettent \u00e0 un utilisateur\nmalveillant de contourner la politique de s\u00e9curit\u00e9 et de lire des\ndonn\u00e9es sans droit.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Opera",
"vendor_advisories": [
{
"published_at": null,
"title": "Annonces de la version 11.60 d\u0027Opera du 06 d\u00e9cembre 2011",
"url": "http://www.opera.com/docs/changelogs/windows/1160/"
}
]
}
icsa-19-192-04
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"names": [
"Wendy Parrington"
],
"organization": "United Utilities",
"summary": "coordinating disclosure"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s TXT advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protectnetwork access to devices with appropriate mechanisms. In order tooperate the devices in a protected IT environment, Siemens recommends toconfigure the environment according to Siemens\u0027 operational guidelinesfor Industrial Security (Download:https://www.siemens.com/cert/operational-guidelines-industrial-security),and to follow the recommendations in the product manuals.",
"title": "General Recommendations"
},
{
"category": "general",
"text": "Additional information on Industrial Security by Siemens can be foundat: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions containedin Siemens\u0027 underlying license terms or other applicable agreements previouslyagreed to with Siemens (hereinafter \"License Terms\"). To the extent applicableto information, software or documentation made available in or through aSiemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website(https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), inparticular Sections 8-10 of the Terms of Use, shall apply additionally. In caseof conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-556833: TLS Vulnerabilities in SIMATIC RF6XXR",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-556833.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-192-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/refs/heads/develop/csaf_files/OT/white/2019/icsa-19-192-04.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-19-192-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-192-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "ICSA-19-192-04 Siemens SIMATIC RF6XXR",
"tracking": {
"current_release_date": "2019-07-09T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-19-192-04",
"initial_release_date": "2019-07-09T00:00:00.000000Z",
"revision_history": [
{
"date": "2019-07-09T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.2.1",
"product": {
"name": "SIMATIC RF615R",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC RF615R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.2.1",
"product": {
"name": "SIMATIC RF68XR",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SIMATIC RF68XR"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SSL protocol encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses e.g. the HTML5 WebSocket API, the Java URLConnection API, or the Silverlight WebClient API, aka a \"BEAST\" attack. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0002"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "mitigation",
"details": "Siemens has identified the following specific workarounds and mitigations thatcustomers can apply to reduce the risk: Restrict network access to the device to the extent possible",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2016-6329",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "TLS, when used with a 64-bit block cipher, could allow remote attackers to obtain cleartext data by leveraging a birthday attack against a long-duration encrypted session, aka a \"Sweet32\" attack. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6329"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0002"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "mitigation",
"details": "Siemens has identified the following specific workarounds and mitigations thatcustomers can apply to reduce the risk: Restrict network access to the device to the extent possible",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2013-0169",
"cwe": {
"id": "CWE-331",
"name": "Insufficient Entropy"
},
"notes": [
{
"category": "summary",
"text": "TLS and DTLS versions 1.1 and 1.2, as used in the affected product, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0169"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0002"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "mitigation",
"details": "Siemens has identified the following specific workarounds and mitigations thatcustomers can apply to reduce the risk: Restrict network access to the device to the extent possible",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
}
]
}
ICSMA-18-058-02
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Phillips",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access to sensitive information, perform man-in-the-middle attacks, create denial of service conditions, or execute arbitrary code.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Healthcare and Public Health",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Do not click web links or open attachments in unsolicited email messages.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSMA-18-058-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsma-18-058-02.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSMA-18-058-02 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-18-058-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Philips Intellispace Portal ISP Vulnerabilities",
"tracking": {
"current_release_date": "2018-02-27T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSMA-18-058-02",
"initial_release_date": "2018-02-27T00:00:00.000000Z",
"revision_history": [
{
"date": "2018-02-27T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSMA-18-058-02 Philips Intellispace Portal ISP Vulnerabilities"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "IntelliSpace Portal 8.0.x: *",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "IntelliSpace Portal 8.0.x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "IntelliSpace Portal 7.0.x: *",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "IntelliSpace Portal 7.0.x"
}
],
"category": "vendor",
"name": "Phillips"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-5474",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have an input validation vulnerability that could allow a remote attacker to execute arbitrary code or cause the application to crash.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5474"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0143",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0143"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0144"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0145",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0145"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0146",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0148.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0146"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0148",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0146.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0148"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0272",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0277, CVE-2017-0278, and CVE-2017-0279.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0272"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0277",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0278, and CVE-2017-0279.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0277"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0278",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0277, and CVE-2017-0279.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0278"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0279",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0277, and CVE-2017-0278.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0279"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0269",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0273 and CVE-2017-0280.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0269"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0273",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0269 and CVE-2017-0280",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0273"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0280",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0269 and CVE-2017-0273.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0280"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0147",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka \"Windows SMB Information Disclosure Vulnerability.\"",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0147"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0267",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0267"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0268",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0268"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0270",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0270"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0271",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0271"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0274",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0275, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0274"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0275",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0275"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0276",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, and CVE-2017-0275.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0276"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5472",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have an insecure windows permissions vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5472"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5468",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have a remote desktop access vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5468"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0199",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka \"Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API.\"",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0199"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2005-1794",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Terminal Server using Remote Desktop Protocol (RDP) 5.2 stores an RSA private key in mstlsapi.dll and uses it to sign a certificate, which allows remote attackers to spoof public keys of legitimate servers and conduct man-in-the-middle attacks.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1794"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5470",
"cwe": {
"id": "CWE-428",
"name": "Unquoted Search Path or Element"
},
"notes": [
{
"category": "summary",
"text": "An unquoted search path or element vulnerability has been identified, which may allow an authorized local user to execute arbitrary code and escalate their level of privileges.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5470"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5454",
"cwe": {
"id": "CWE-489",
"name": "Active Debug Code"
},
"notes": [
{
"category": "summary",
"text": "The ISP has a vulnerability where code debugging methods are enabled, which could allow an attacker to remotely execute arbitrary code during runtime.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5454"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5458",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have a remote desktop access vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5458"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5462",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an SSL incorrect hostname certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5462"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5464",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an untrusted SSL certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5464"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have a self-signed SSL certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5466"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2011-3389",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2004-2761",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2761"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2014-3566",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the \"POODLE\" issue.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2016-2183",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2183"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
}
]
}
icsma-18-058-02
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Phillips",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access to sensitive information, perform man-in-the-middle attacks, create denial of service conditions, or execute arbitrary code.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Healthcare and Public Health",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Do not click web links or open attachments in unsolicited email messages.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSMA-18-058-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsma-18-058-02.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSMA-18-058-02 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-18-058-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Philips Intellispace Portal ISP Vulnerabilities",
"tracking": {
"current_release_date": "2018-02-27T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSMA-18-058-02",
"initial_release_date": "2018-02-27T00:00:00.000000Z",
"revision_history": [
{
"date": "2018-02-27T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSMA-18-058-02 Philips Intellispace Portal ISP Vulnerabilities"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "IntelliSpace Portal 8.0.x: *",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "IntelliSpace Portal 8.0.x"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "IntelliSpace Portal 7.0.x: *",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "IntelliSpace Portal 7.0.x"
}
],
"category": "vendor",
"name": "Phillips"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-5474",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have an input validation vulnerability that could allow a remote attacker to execute arbitrary code or cause the application to crash.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5474"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0143",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0143"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0144"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0145",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0145"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0146",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0148.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0146"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0148",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0146.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0148"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0272",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0277, CVE-2017-0278, and CVE-2017-0279.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0272"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0277",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0278, and CVE-2017-0279.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0277"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0278",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0277, and CVE-2017-0279.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0278"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0279",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0277, and CVE-2017-0278.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0279"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0269",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0273 and CVE-2017-0280.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0269"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0273",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0269 and CVE-2017-0280",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0273"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0280",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0269 and CVE-2017-0273.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0280"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0147",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka \"Windows SMB Information Disclosure Vulnerability.\"",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0147"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0267",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0267"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0268",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0268"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0270",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0270"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0271",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0271"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0274",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0275, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0274"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0275",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, and CVE-2017-0276.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0275"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0276",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, and CVE-2017-0275.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0276"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5472",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have an insecure windows permissions vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5472"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5468",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have a remote desktop access vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5468"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2017-0199",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka \"Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API.\"",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0199"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2005-1794",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Terminal Server using Remote Desktop Protocol (RDP) 5.2 stores an RSA private key in mstlsapi.dll and uses it to sign a certificate, which allows remote attackers to spoof public keys of legitimate servers and conduct man-in-the-middle attacks.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1794"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5470",
"cwe": {
"id": "CWE-428",
"name": "Unquoted Search Path or Element"
},
"notes": [
{
"category": "summary",
"text": "An unquoted search path or element vulnerability has been identified, which may allow an authorized local user to execute arbitrary code and escalate their level of privileges.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5470"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5454",
"cwe": {
"id": "CWE-489",
"name": "Active Debug Code"
},
"notes": [
{
"category": "summary",
"text": "The ISP has a vulnerability where code debugging methods are enabled, which could allow an attacker to remotely execute arbitrary code during runtime.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5454"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5458",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have a remote desktop access vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5458"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5462",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an SSL incorrect hostname certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5462"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5464",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an untrusted SSL certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5464"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2018-5466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have a self-signed SSL certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5466"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2011-3389",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2004-2761",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2761"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2014-3566",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the \"POODLE\" issue.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2016-2183",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2183"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "http://incenter.medical.philips.com"
},
{
"category": "mitigation",
"details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions"
},
{
"category": "mitigation",
"details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.philips.com/productsecurity"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
}
]
}
ICSA-19-192-04
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"names": [
"Wendy Parrington"
],
"organization": "United Utilities",
"summary": "coordinating disclosure"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s TXT advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protectnetwork access to devices with appropriate mechanisms. In order tooperate the devices in a protected IT environment, Siemens recommends toconfigure the environment according to Siemens\u0027 operational guidelinesfor Industrial Security (Download:https://www.siemens.com/cert/operational-guidelines-industrial-security),and to follow the recommendations in the product manuals.",
"title": "General Recommendations"
},
{
"category": "general",
"text": "Additional information on Industrial Security by Siemens can be foundat: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions containedin Siemens\u0027 underlying license terms or other applicable agreements previouslyagreed to with Siemens (hereinafter \"License Terms\"). To the extent applicableto information, software or documentation made available in or through aSiemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website(https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), inparticular Sections 8-10 of the Terms of Use, shall apply additionally. In caseof conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-556833: TLS Vulnerabilities in SIMATIC RF6XXR",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-556833.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-192-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/refs/heads/develop/csaf_files/OT/white/2019/icsa-19-192-04.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-19-192-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-192-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "ICSA-19-192-04 Siemens SIMATIC RF6XXR",
"tracking": {
"current_release_date": "2019-07-09T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-19-192-04",
"initial_release_date": "2019-07-09T00:00:00.000000Z",
"revision_history": [
{
"date": "2019-07-09T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.2.1",
"product": {
"name": "SIMATIC RF615R",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC RF615R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.2.1",
"product": {
"name": "SIMATIC RF68XR",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SIMATIC RF68XR"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SSL protocol encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses e.g. the HTML5 WebSocket API, the Java URLConnection API, or the Silverlight WebClient API, aka a \"BEAST\" attack. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0002"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "mitigation",
"details": "Siemens has identified the following specific workarounds and mitigations thatcustomers can apply to reduce the risk: Restrict network access to the device to the extent possible",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2016-6329",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "TLS, when used with a 64-bit block cipher, could allow remote attackers to obtain cleartext data by leveraging a birthday attack against a long-duration encrypted session, aka a \"Sweet32\" attack. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6329"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0002"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "mitigation",
"details": "Siemens has identified the following specific workarounds and mitigations thatcustomers can apply to reduce the risk: Restrict network access to the device to the extent possible",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2013-0169",
"cwe": {
"id": "CWE-331",
"name": "Insufficient Entropy"
},
"notes": [
{
"category": "summary",
"text": "TLS and DTLS versions 1.1 and 1.2, as used in the affected product, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0169"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "vendor_fix",
"details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501",
"product_ids": [
"CSAFPID-0002"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109768501"
},
{
"category": "mitigation",
"details": "Siemens has identified the following specific workarounds and mitigations thatcustomers can apply to reduce the risk: Restrict network access to the device to the extent possible",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
}
]
}
icsa-14-098-03
Vulnerability from csaf_cisa
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-14-098-03 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2014/icsa-14-098-03.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-14-098-03 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-098-03"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Siemens Ruggedcom WIN Products BEAST Attack Vulnerability",
"tracking": {
"current_release_date": "2025-06-09T19:47:56.923899Z",
"generator": {
"date": "2025-06-09T19:47:56.923841Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-14-098-03",
"initial_release_date": "2014-01-09T07:00:00.000000Z",
"revision_history": [
{
"date": "2014-01-09T07:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2025-06-09T19:47:56.923899Z",
"legacy_version": "CSAF Conversion",
"number": "2",
"summary": "Advisory converted into a CSAF"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cv4.4",
"product": {
"name": "Siemens WIN7000: \u003cv4.4",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "WIN7000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cv4.4",
"product": {
"name": "Siemens WIN7200: \u003cv4.4",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "WIN7200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cv4.4",
"product": {
"name": "Siemens WIN5100: \u003cv4.4",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "WIN5100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cv4.4",
"product": {
"name": "Siemens WIN5200: \u003cv4.4",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "WIN5200"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens has provided a firmware update (Ruggedcom WIN v4.4) that supports the mitigation technique and recommends customers to update to this version (http://www.siemens.com/cert/advisories)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "http://www.siemens.com/cert/advisories"
}
],
"scores": [
{
"cvss_v2": {
"baseScore": 4.3,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
}
]
}
opensuse-su-2024:14434-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python314-3.14.0~a1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python314-3.14.0~a1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14434",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14434-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10735 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15523 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15801 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8492 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23336 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3426 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-25236 page",
"url": "https://www.suse.com/security/cve/CVE-2022-25236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42919 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45061 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0286 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-24329 page",
"url": "https://www.suse.com/security/cve/CVE-2023-24329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2650 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-27043 page",
"url": "https://www.suse.com/security/cve/CVE-2023-27043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-40217 page",
"url": "https://www.suse.com/security/cve/CVE-2023-40217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52425 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4030 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4032 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8088/"
}
],
"title": "python314-3.14.0~a1-1.1 on GA media",
"tracking": {
"current_release_date": "2024-10-28T00:00:00Z",
"generator": {
"date": "2024-10-28T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14434-1",
"initial_release_date": "2024-10-28T00:00:00Z",
"revision_history": [
{
"date": "2024-10-28T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python314-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-3.14.0~a1-1.1.aarch64",
"product_id": "python314-3.14.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python314-curses-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-curses-3.14.0~a1-1.1.aarch64",
"product_id": "python314-curses-3.14.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python314-dbm-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-dbm-3.14.0~a1-1.1.aarch64",
"product_id": "python314-dbm-3.14.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python314-idle-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-idle-3.14.0~a1-1.1.aarch64",
"product_id": "python314-idle-3.14.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python314-tk-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-tk-3.14.0~a1-1.1.aarch64",
"product_id": "python314-tk-3.14.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"product_id": "python314-x86-64-v3-3.14.0~a1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python314-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-3.14.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python314-curses-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-curses-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-curses-3.14.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python314-dbm-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-dbm-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-dbm-3.14.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python314-idle-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-idle-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-idle-3.14.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python314-tk-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-tk-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-tk-3.14.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-x86-64-v3-3.14.0~a1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python314-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-3.14.0~a1-1.1.s390x",
"product_id": "python314-3.14.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python314-curses-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-curses-3.14.0~a1-1.1.s390x",
"product_id": "python314-curses-3.14.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python314-dbm-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-dbm-3.14.0~a1-1.1.s390x",
"product_id": "python314-dbm-3.14.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python314-idle-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-idle-3.14.0~a1-1.1.s390x",
"product_id": "python314-idle-3.14.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python314-tk-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-tk-3.14.0~a1-1.1.s390x",
"product_id": "python314-tk-3.14.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"product_id": "python314-x86-64-v3-3.14.0~a1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python314-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-3.14.0~a1-1.1.x86_64",
"product_id": "python314-3.14.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python314-curses-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-curses-3.14.0~a1-1.1.x86_64",
"product_id": "python314-curses-3.14.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python314-dbm-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-dbm-3.14.0~a1-1.1.x86_64",
"product_id": "python314-dbm-3.14.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python314-idle-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-idle-3.14.0~a1-1.1.x86_64",
"product_id": "python314-idle-3.14.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python314-tk-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-tk-3.14.0~a1-1.1.x86_64",
"product_id": "python314-tk-3.14.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python314-x86-64-v3-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.x86_64",
"product_id": "python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-curses-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-curses-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-curses-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-curses-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-curses-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-curses-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-curses-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-curses-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-dbm-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-dbm-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-dbm-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-dbm-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-dbm-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-dbm-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-dbm-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-dbm-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-idle-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-idle-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-idle-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-idle-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-idle-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-idle-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-idle-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-idle-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-tk-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-tk-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-tk-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-tk-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-tk-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-tk-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-tk-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-tk-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-x86-64-v3-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2019-20907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20907"
}
],
"notes": [
{
"category": "general",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20907",
"url": "https://www.suse.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "SUSE Bug 1174091 for CVE-2019-20907",
"url": "https://bugzilla.suse.com/1174091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2020-10735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10735"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10735",
"url": "https://www.suse.com/security/cve/CVE-2020-10735"
},
{
"category": "external",
"summary": "SUSE Bug 1203125 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1203125"
},
{
"category": "external",
"summary": "SUSE Bug 1204077 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204077"
},
{
"category": "external",
"summary": "SUSE Bug 1204096 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204096"
},
{
"category": "external",
"summary": "SUSE Bug 1204097 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204097"
},
{
"category": "external",
"summary": "SUSE Bug 1205075 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1205075"
},
{
"category": "external",
"summary": "SUSE Bug 1208131 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1208131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-15523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15523"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15523",
"url": "https://www.suse.com/security/cve/CVE-2020-15523"
},
{
"category": "external",
"summary": "SUSE Bug 1173745 for CVE-2020-15523",
"url": "https://bugzilla.suse.com/1173745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15523"
},
{
"cve": "CVE-2020-15801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15801"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15801",
"url": "https://www.suse.com/security/cve/CVE-2020-15801"
},
{
"category": "external",
"summary": "SUSE Bug 1174241 for CVE-2020-15801",
"url": "https://bugzilla.suse.com/1174241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-15801"
},
{
"cve": "CVE-2020-8492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8492"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8492",
"url": "https://www.suse.com/security/cve/CVE-2020-8492"
},
{
"category": "external",
"summary": "SUSE Bug 1162367 for CVE-2020-8492",
"url": "https://bugzilla.suse.com/1162367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2021-23336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23336"
}
],
"notes": [
{
"category": "general",
"text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23336",
"url": "https://www.suse.com/security/cve/CVE-2021-23336"
},
{
"category": "external",
"summary": "SUSE Bug 1182179 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182179"
},
{
"category": "external",
"summary": "SUSE Bug 1182379 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182379"
},
{
"category": "external",
"summary": "SUSE Bug 1182433 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3177"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3177",
"url": "https://www.suse.com/security/cve/CVE-2021-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1181126 for CVE-2021-3177",
"url": "https://bugzilla.suse.com/1181126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-3426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3426"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3426",
"url": "https://www.suse.com/security/cve/CVE-2021-3426"
},
{
"category": "external",
"summary": "SUSE Bug 1183374 for CVE-2021-3426",
"url": "https://bugzilla.suse.com/1183374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3426"
},
{
"cve": "CVE-2022-25236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-25236"
}
],
"notes": [
{
"category": "general",
"text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-25236",
"url": "https://www.suse.com/security/cve/CVE-2022-25236"
},
{
"category": "external",
"summary": "SUSE Bug 1196025 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196025"
},
{
"category": "external",
"summary": "SUSE Bug 1196784 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196784"
},
{
"category": "external",
"summary": "SUSE Bug 1197217 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1197217"
},
{
"category": "external",
"summary": "SUSE Bug 1200038 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1200038"
},
{
"category": "external",
"summary": "SUSE Bug 1201735 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1201735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-42919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42919"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42919",
"url": "https://www.suse.com/security/cve/CVE-2022-42919"
},
{
"category": "external",
"summary": "SUSE Bug 1204886 for CVE-2022-42919",
"url": "https://bugzilla.suse.com/1204886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45061"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45061",
"url": "https://www.suse.com/security/cve/CVE-2022-45061"
},
{
"category": "external",
"summary": "SUSE Bug 1205244 for CVE-2022-45061",
"url": "https://bugzilla.suse.com/1205244"
},
{
"category": "external",
"summary": "SUSE Bug 1211488 for CVE-2022-45061",
"url": "https://bugzilla.suse.com/1211488"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2023-0286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0286"
}
],
"notes": [
{
"category": "general",
"text": "There is a type confusion vulnerability relating to X.400 address processing\ninside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but\nthe public structure definition for GENERAL_NAME incorrectly specified the type\nof the x400Address field as ASN1_TYPE. This field is subsequently interpreted by\nthe OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an\nASN1_STRING.\n\nWhen CRL checking is enabled (i.e. the application sets the\nX509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass\narbitrary pointers to a memcmp call, enabling them to read memory contents or\nenact a denial of service. In most cases, the attack requires the attacker to\nprovide both the certificate chain and CRL, neither of which need to have a\nvalid signature. If the attacker only controls one of these inputs, the other\ninput must already contain an X.400 address as a CRL distribution point, which\nis uncommon. As such, this vulnerability is most likely to only affect\napplications which have implemented their own functionality for retrieving CRLs\nover a network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0286",
"url": "https://www.suse.com/security/cve/CVE-2023-0286"
},
{
"category": "external",
"summary": "SUSE Bug 1207533 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1207533"
},
{
"category": "external",
"summary": "SUSE Bug 1207569 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1207569"
},
{
"category": "external",
"summary": "SUSE Bug 1211136 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1211136"
},
{
"category": "external",
"summary": "SUSE Bug 1211503 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1211503"
},
{
"category": "external",
"summary": "SUSE Bug 1213146 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1213146"
},
{
"category": "external",
"summary": "SUSE Bug 1214269 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1214269"
},
{
"category": "external",
"summary": "SUSE Bug 1218477 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1218477"
},
{
"category": "external",
"summary": "SUSE Bug 1218967 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1218967"
},
{
"category": "external",
"summary": "SUSE Bug 1225677 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1225677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-24329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-24329"
}
],
"notes": [
{
"category": "general",
"text": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-24329",
"url": "https://www.suse.com/security/cve/CVE-2023-24329"
},
{
"category": "external",
"summary": "SUSE Bug 1208471 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1208471"
},
{
"category": "external",
"summary": "SUSE Bug 1213553 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213553"
},
{
"category": "external",
"summary": "SUSE Bug 1213554 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213554"
},
{
"category": "external",
"summary": "SUSE Bug 1213839 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213839"
},
{
"category": "external",
"summary": "SUSE Bug 1225672 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1225672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-2650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2650"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Processing some specially crafted ASN.1 object identifiers or\ndata containing them may be very slow.\n\nImpact summary: Applications that use OBJ_obj2txt() directly, or use any of\nthe OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message\nsize limit may experience notable to very long delays when processing those\nmessages, which may lead to a Denial of Service.\n\nAn OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -\nmost of which have no size limit. OBJ_obj2txt() may be used to translate\nan ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL\ntype ASN1_OBJECT) to its canonical numeric text form, which are the\nsub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by\nperiods.\n\nWhen one of the sub-identifiers in the OBJECT IDENTIFIER is very large\n(these are sizes that are seen as absurdly large, taking up tens or hundreds\nof KiBs), the translation to a decimal number in text may take a very long\ntime. The time complexity is O(n^2) with \u0027n\u0027 being the size of the\nsub-identifiers in bytes (*).\n\nWith OpenSSL 3.0, support to fetch cryptographic algorithms using names /\nidentifiers in string form was introduced. This includes using OBJECT\nIDENTIFIERs in canonical numeric text form as identifiers for fetching\nalgorithms.\n\nSuch OBJECT IDENTIFIERs may be received through the ASN.1 structure\nAlgorithmIdentifier, which is commonly used in multiple protocols to specify\nwhat cryptographic algorithm should be used to sign or verify, encrypt or\ndecrypt, or digest passed data.\n\nApplications that call OBJ_obj2txt() directly with untrusted data are\naffected, with any version of OpenSSL. If the use is for the mere purpose\nof display, the severity is considered low.\n\nIn OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,\nCMS, CMP/CRMF or TS. It also impacts anything that processes X.509\ncertificates, including simple things like verifying its signature.\n\nThe impact on TLS is relatively low, because all versions of OpenSSL have a\n100KiB limit on the peer\u0027s certificate chain. Additionally, this only\nimpacts clients, or servers that have explicitly enabled client\nauthentication.\n\nIn OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,\nsuch as X.509 certificates. This is assumed to not happen in such a way\nthat it would cause a Denial of Service, so these versions are considered\nnot affected by this issue in such a way that it would be cause for concern,\nand the severity is therefore considered low.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2650",
"url": "https://www.suse.com/security/cve/CVE-2023-2650"
},
{
"category": "external",
"summary": "SUSE Bug 1211430 for CVE-2023-2650",
"url": "https://bugzilla.suse.com/1211430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-27043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-27043"
}
],
"notes": [
{
"category": "general",
"text": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-27043",
"url": "https://www.suse.com/security/cve/CVE-2023-27043"
},
{
"category": "external",
"summary": "SUSE Bug 1210638 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1210638"
},
{
"category": "external",
"summary": "SUSE Bug 1222537 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1222537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-40217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-40217"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as \"not connected\" and won\u0027t initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-40217",
"url": "https://www.suse.com/security/cve/CVE-2023-40217"
},
{
"category": "external",
"summary": "SUSE Bug 1214692 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1214692"
},
{
"category": "external",
"summary": "SUSE Bug 1217524 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1217524"
},
{
"category": "external",
"summary": "SUSE Bug 1218319 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218319"
},
{
"category": "external",
"summary": "SUSE Bug 1218476 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218476"
},
{
"category": "external",
"summary": "SUSE Bug 1218965 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218965"
},
{
"category": "external",
"summary": "SUSE Bug 1219472 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1219472"
},
{
"category": "external",
"summary": "SUSE Bug 1219713 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1219713"
},
{
"category": "external",
"summary": "SUSE Bug 1221582 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1221582"
},
{
"category": "external",
"summary": "SUSE Bug 1224883 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1224883"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-52425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52425"
}
],
"notes": [
{
"category": "general",
"text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52425",
"url": "https://www.suse.com/security/cve/CVE-2023-52425"
},
{
"category": "external",
"summary": "SUSE Bug 1219559 for CVE-2023-52425",
"url": "https://bugzilla.suse.com/1219559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2024-4030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4030"
}
],
"notes": [
{
"category": "general",
"text": "On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\n\nIf you\u0027re not using Windows or haven\u0027t changed the temporary directory location then you aren\u0027t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\n\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \"700\" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4030",
"url": "https://www.suse.com/security/cve/CVE-2024-4030"
},
{
"category": "external",
"summary": "SUSE Bug 1227152 for CVE-2024-4030",
"url": "https://bugzilla.suse.com/1227152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4032"
}
],
"notes": [
{
"category": "general",
"text": "The \"ipaddress\" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as \"globally reachable\" or \"private\". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn\u0027t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.\n\nCPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4032",
"url": "https://www.suse.com/security/cve/CVE-2024-4032"
},
{
"category": "external",
"summary": "SUSE Bug 1226448 for CVE-2024-4032",
"url": "https://bugzilla.suse.com/1226448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6923"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe \nemail module didn\u0027t properly quote newlines for email headers when \nserializing an email message allowing for header injection when an email\n is serialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6923",
"url": "https://www.suse.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "SUSE Bug 1228780 for CVE-2024-6923",
"url": "https://bugzilla.suse.com/1228780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8088"
}
],
"notes": [
{
"category": "general",
"text": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8088",
"url": "https://www.suse.com/security/cve/CVE-2024-8088"
},
{
"category": "external",
"summary": "SUSE Bug 1229704 for CVE-2024-8088",
"url": "https://bugzilla.suse.com/1229704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-8088"
}
]
}
opensuse-su-2020:0086-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python3 to version 3.6.10 fixes the following issues:\n\n- CVE-2017-18207: Fixed a denial of service in Wave_read._read_fmt_chunk() (bsc#1083507).\n- CVE-2019-16056: Fixed an issue where email parsing could fail for multiple @ (bsc#1149955).\n- CVE-2019-15903: Fixed a heap-based buffer over-read in libexpat (bsc#1149429).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-86",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0086-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:0086-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:0086-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/"
},
{
"category": "self",
"summary": "SUSE Bug 1027282",
"url": "https://bugzilla.suse.com/1027282"
},
{
"category": "self",
"summary": "SUSE Bug 1029377",
"url": "https://bugzilla.suse.com/1029377"
},
{
"category": "self",
"summary": "SUSE Bug 1029902",
"url": "https://bugzilla.suse.com/1029902"
},
{
"category": "self",
"summary": "SUSE Bug 1040164",
"url": "https://bugzilla.suse.com/1040164"
},
{
"category": "self",
"summary": "SUSE Bug 1042670",
"url": "https://bugzilla.suse.com/1042670"
},
{
"category": "self",
"summary": "SUSE Bug 1070853",
"url": "https://bugzilla.suse.com/1070853"
},
{
"category": "self",
"summary": "SUSE Bug 1079761",
"url": "https://bugzilla.suse.com/1079761"
},
{
"category": "self",
"summary": "SUSE Bug 1081750",
"url": "https://bugzilla.suse.com/1081750"
},
{
"category": "self",
"summary": "SUSE Bug 1083507",
"url": "https://bugzilla.suse.com/1083507"
},
{
"category": "self",
"summary": "SUSE Bug 1086001",
"url": "https://bugzilla.suse.com/1086001"
},
{
"category": "self",
"summary": "SUSE Bug 1088004",
"url": "https://bugzilla.suse.com/1088004"
},
{
"category": "self",
"summary": "SUSE Bug 1088009",
"url": "https://bugzilla.suse.com/1088009"
},
{
"category": "self",
"summary": "SUSE Bug 1088573",
"url": "https://bugzilla.suse.com/1088573"
},
{
"category": "self",
"summary": "SUSE Bug 1094814",
"url": "https://bugzilla.suse.com/1094814"
},
{
"category": "self",
"summary": "SUSE Bug 1107030",
"url": "https://bugzilla.suse.com/1107030"
},
{
"category": "self",
"summary": "SUSE Bug 1109663",
"url": "https://bugzilla.suse.com/1109663"
},
{
"category": "self",
"summary": "SUSE Bug 1109847",
"url": "https://bugzilla.suse.com/1109847"
},
{
"category": "self",
"summary": "SUSE Bug 1120644",
"url": "https://bugzilla.suse.com/1120644"
},
{
"category": "self",
"summary": "SUSE Bug 1122191",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "self",
"summary": "SUSE Bug 1129346",
"url": "https://bugzilla.suse.com/1129346"
},
{
"category": "self",
"summary": "SUSE Bug 1130840",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "self",
"summary": "SUSE Bug 1133452",
"url": "https://bugzilla.suse.com/1133452"
},
{
"category": "self",
"summary": "SUSE Bug 1137942",
"url": "https://bugzilla.suse.com/1137942"
},
{
"category": "self",
"summary": "SUSE Bug 1138459",
"url": "https://bugzilla.suse.com/1138459"
},
{
"category": "self",
"summary": "SUSE Bug 1141853",
"url": "https://bugzilla.suse.com/1141853"
},
{
"category": "self",
"summary": "SUSE Bug 1149121",
"url": "https://bugzilla.suse.com/1149121"
},
{
"category": "self",
"summary": "SUSE Bug 1149792",
"url": "https://bugzilla.suse.com/1149792"
},
{
"category": "self",
"summary": "SUSE Bug 1149955",
"url": "https://bugzilla.suse.com/1149955"
},
{
"category": "self",
"summary": "SUSE Bug 1151490",
"url": "https://bugzilla.suse.com/1151490"
},
{
"category": "self",
"summary": "SUSE Bug 1153238",
"url": "https://bugzilla.suse.com/1153238"
},
{
"category": "self",
"summary": "SUSE Bug 1159035",
"url": "https://bugzilla.suse.com/1159035"
},
{
"category": "self",
"summary": "SUSE Bug 1159622",
"url": "https://bugzilla.suse.com/1159622"
},
{
"category": "self",
"summary": "SUSE Bug 637176",
"url": "https://bugzilla.suse.com/637176"
},
{
"category": "self",
"summary": "SUSE Bug 658604",
"url": "https://bugzilla.suse.com/658604"
},
{
"category": "self",
"summary": "SUSE Bug 673071",
"url": "https://bugzilla.suse.com/673071"
},
{
"category": "self",
"summary": "SUSE Bug 709442",
"url": "https://bugzilla.suse.com/709442"
},
{
"category": "self",
"summary": "SUSE Bug 743787",
"url": "https://bugzilla.suse.com/743787"
},
{
"category": "self",
"summary": "SUSE Bug 747125",
"url": "https://bugzilla.suse.com/747125"
},
{
"category": "self",
"summary": "SUSE Bug 751718",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "self",
"summary": "SUSE Bug 754447",
"url": "https://bugzilla.suse.com/754447"
},
{
"category": "self",
"summary": "SUSE Bug 754677",
"url": "https://bugzilla.suse.com/754677"
},
{
"category": "self",
"summary": "SUSE Bug 787526",
"url": "https://bugzilla.suse.com/787526"
},
{
"category": "self",
"summary": "SUSE Bug 809831",
"url": "https://bugzilla.suse.com/809831"
},
{
"category": "self",
"summary": "SUSE Bug 831629",
"url": "https://bugzilla.suse.com/831629"
},
{
"category": "self",
"summary": "SUSE Bug 834601",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "self",
"summary": "SUSE Bug 871152",
"url": "https://bugzilla.suse.com/871152"
},
{
"category": "self",
"summary": "SUSE Bug 885662",
"url": "https://bugzilla.suse.com/885662"
},
{
"category": "self",
"summary": "SUSE Bug 885882",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "self",
"summary": "SUSE Bug 917607",
"url": "https://bugzilla.suse.com/917607"
},
{
"category": "self",
"summary": "SUSE Bug 942751",
"url": "https://bugzilla.suse.com/942751"
},
{
"category": "self",
"summary": "SUSE Bug 951166",
"url": "https://bugzilla.suse.com/951166"
},
{
"category": "self",
"summary": "SUSE Bug 983582",
"url": "https://bugzilla.suse.com/983582"
},
{
"category": "self",
"summary": "SUSE Bug 984751",
"url": "https://bugzilla.suse.com/984751"
},
{
"category": "self",
"summary": "SUSE Bug 985177",
"url": "https://bugzilla.suse.com/985177"
},
{
"category": "self",
"summary": "SUSE Bug 985348",
"url": "https://bugzilla.suse.com/985348"
},
{
"category": "self",
"summary": "SUSE Bug 989523",
"url": "https://bugzilla.suse.com/989523"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0772 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000110 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5636 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5699 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5699/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18207 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000802 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000802/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1060 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1061 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14647 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20406 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20406/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20852 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10160 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15903 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16935 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16935/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9636 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
}
],
"title": "Security update for python3",
"tracking": {
"current_release_date": "2020-01-21T15:12:01Z",
"generator": {
"date": "2020-01-21T15:12:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:0086-1",
"initial_release_date": "2020-01-21T15:12:01Z",
"revision_history": [
{
"date": "2020-01-21T15:12:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"product": {
"name": "libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"product_id": "libpython3_6m1_0-3.6.10-lp151.6.7.1.i586"
}
},
{
"category": "product_version",
"name": "python3-3.6.10-lp151.6.7.1.i586",
"product": {
"name": "python3-3.6.10-lp151.6.7.1.i586",
"product_id": "python3-3.6.10-lp151.6.7.1.i586"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.10-lp151.6.7.1.i586",
"product": {
"name": "python3-base-3.6.10-lp151.6.7.1.i586",
"product_id": "python3-base-3.6.10-lp151.6.7.1.i586"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.10-lp151.6.7.1.i586",
"product": {
"name": "python3-curses-3.6.10-lp151.6.7.1.i586",
"product_id": "python3-curses-3.6.10-lp151.6.7.1.i586"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.10-lp151.6.7.1.i586",
"product": {
"name": "python3-dbm-3.6.10-lp151.6.7.1.i586",
"product_id": "python3-dbm-3.6.10-lp151.6.7.1.i586"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.10-lp151.6.7.1.i586",
"product": {
"name": "python3-devel-3.6.10-lp151.6.7.1.i586",
"product_id": "python3-devel-3.6.10-lp151.6.7.1.i586"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.10-lp151.6.7.1.i586",
"product": {
"name": "python3-idle-3.6.10-lp151.6.7.1.i586",
"product_id": "python3-idle-3.6.10-lp151.6.7.1.i586"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.10-lp151.6.7.1.i586",
"product": {
"name": "python3-testsuite-3.6.10-lp151.6.7.1.i586",
"product_id": "python3-testsuite-3.6.10-lp151.6.7.1.i586"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.10-lp151.6.7.1.i586",
"product": {
"name": "python3-tk-3.6.10-lp151.6.7.1.i586",
"product_id": "python3-tk-3.6.10-lp151.6.7.1.i586"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.10-lp151.6.7.1.i586",
"product": {
"name": "python3-tools-3.6.10-lp151.6.7.1.i586",
"product_id": "python3-tools-3.6.10-lp151.6.7.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"product_id": "libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"product_id": "libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "python3-3.6.10-lp151.6.7.1.x86_64",
"product_id": "python3-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"product_id": "python3-32bit-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "python3-base-3.6.10-lp151.6.7.1.x86_64",
"product_id": "python3-base-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"product_id": "python3-base-32bit-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "python3-curses-3.6.10-lp151.6.7.1.x86_64",
"product_id": "python3-curses-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"product_id": "python3-dbm-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "python3-devel-3.6.10-lp151.6.7.1.x86_64",
"product_id": "python3-devel-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "python3-idle-3.6.10-lp151.6.7.1.x86_64",
"product_id": "python3-idle-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"product_id": "python3-testsuite-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "python3-tk-3.6.10-lp151.6.7.1.x86_64",
"product_id": "python3-tk-3.6.10-lp151.6.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.10-lp151.6.7.1.x86_64",
"product": {
"name": "python3-tools-3.6.10-lp151.6.7.1.x86_64",
"product_id": "python3-tools-3.6.10-lp151.6.7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.10-lp151.6.7.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586"
},
"product_reference": "libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.10-lp151.6.7.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586"
},
"product_reference": "python3-3.6.10-lp151.6.7.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "python3-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-32bit-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.10-lp151.6.7.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586"
},
"product_reference": "python3-base-3.6.10-lp151.6.7.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "python3-base-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-32bit-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.10-lp151.6.7.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586"
},
"product_reference": "python3-curses-3.6.10-lp151.6.7.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "python3-curses-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.10-lp151.6.7.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586"
},
"product_reference": "python3-dbm-3.6.10-lp151.6.7.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.10-lp151.6.7.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586"
},
"product_reference": "python3-devel-3.6.10-lp151.6.7.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "python3-devel-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.10-lp151.6.7.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586"
},
"product_reference": "python3-idle-3.6.10-lp151.6.7.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "python3-idle-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.6.10-lp151.6.7.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586"
},
"product_reference": "python3-testsuite-3.6.10-lp151.6.7.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.10-lp151.6.7.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586"
},
"product_reference": "python3-tk-3.6.10-lp151.6.7.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "python3-tk-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.10-lp151.6.7.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586"
},
"product_reference": "python3-tools-3.6.10-lp151.6.7.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.10-lp151.6.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
},
"product_reference": "python3-tools-3.6.10-lp151.6.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2016-0772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0772"
}
],
"notes": [
{
"category": "general",
"text": "The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a \"StartTLS stripping attack.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0772",
"url": "https://www.suse.com/security/cve/CVE-2016-0772"
},
{
"category": "external",
"summary": "SUSE Bug 984751 for CVE-2016-0772",
"url": "https://bugzilla.suse.com/984751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2016-0772"
},
{
"cve": "CVE-2016-1000110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000110"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000110",
"url": "https://www.suse.com/security/cve/CVE-2016-1000110"
},
{
"category": "external",
"summary": "SUSE Bug 988484 for CVE-2016-1000110",
"url": "https://bugzilla.suse.com/988484"
},
{
"category": "external",
"summary": "SUSE Bug 989523 for CVE-2016-1000110",
"url": "https://bugzilla.suse.com/989523"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2016-1000110"
},
{
"cve": "CVE-2016-5636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5636"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5636",
"url": "https://www.suse.com/security/cve/CVE-2016-5636"
},
{
"category": "external",
"summary": "SUSE Bug 1065451 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/1065451"
},
{
"category": "external",
"summary": "SUSE Bug 1106262 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/1106262"
},
{
"category": "external",
"summary": "SUSE Bug 985177 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/985177"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2016-5636"
},
{
"cve": "CVE-2016-5699",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5699"
}
],
"notes": [
{
"category": "general",
"text": "CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5699",
"url": "https://www.suse.com/security/cve/CVE-2016-5699"
},
{
"category": "external",
"summary": "SUSE Bug 1122729 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/1122729"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 985348 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/985348"
},
{
"category": "external",
"summary": "SUSE Bug 985351 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/985351"
},
{
"category": "external",
"summary": "SUSE Bug 986630 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/986630"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2016-5699"
},
{
"cve": "CVE-2017-18207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18207"
}
],
"notes": [
{
"category": "general",
"text": "The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18207",
"url": "https://www.suse.com/security/cve/CVE-2017-18207"
},
{
"category": "external",
"summary": "SUSE Bug 1083507 for CVE-2017-18207",
"url": "https://bugzilla.suse.com/1083507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2017-18207"
},
{
"cve": "CVE-2018-1000802",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000802"
}
],
"notes": [
{
"category": "general",
"text": "Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000802",
"url": "https://www.suse.com/security/cve/CVE-2018-1000802"
},
{
"category": "external",
"summary": "SUSE Bug 1109663 for CVE-2018-1000802",
"url": "https://bugzilla.suse.com/1109663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000802"
},
{
"cve": "CVE-2018-1060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1060"
}
],
"notes": [
{
"category": "general",
"text": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib\u0027s apop() method. An attacker could use this flaw to cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1060",
"url": "https://www.suse.com/security/cve/CVE-2018-1060"
},
{
"category": "external",
"summary": "SUSE Bug 1088009 for CVE-2018-1060",
"url": "https://bugzilla.suse.com/1088009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "low"
}
],
"title": "CVE-2018-1060"
},
{
"cve": "CVE-2018-1061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1061"
}
],
"notes": [
{
"category": "general",
"text": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1061",
"url": "https://www.suse.com/security/cve/CVE-2018-1061"
},
{
"category": "external",
"summary": "SUSE Bug 1088004 for CVE-2018-1061",
"url": "https://bugzilla.suse.com/1088004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "low"
}
],
"title": "CVE-2018-1061"
},
{
"cve": "CVE-2018-14647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14647"
}
],
"notes": [
{
"category": "general",
"text": "Python\u0027s elementtree C accelerator failed to initialise Expat\u0027s hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat\u0027s internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14647",
"url": "https://www.suse.com/security/cve/CVE-2018-14647"
},
{
"category": "external",
"summary": "SUSE Bug 1109847 for CVE-2018-14647",
"url": "https://bugzilla.suse.com/1109847"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2018-14647",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2018-14647"
},
{
"cve": "CVE-2018-20406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20406"
}
],
"notes": [
{
"category": "general",
"text": "Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a \"resize to twice the size\" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20406",
"url": "https://www.suse.com/security/cve/CVE-2018-20406"
},
{
"category": "external",
"summary": "SUSE Bug 1120644 for CVE-2018-20406",
"url": "https://bugzilla.suse.com/1120644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2018-20406"
},
{
"cve": "CVE-2018-20852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20852"
}
],
"notes": [
{
"category": "general",
"text": "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20852",
"url": "https://www.suse.com/security/cve/CVE-2018-20852"
},
{
"category": "external",
"summary": "SUSE Bug 1141853 for CVE-2018-20852",
"url": "https://bugzilla.suse.com/1141853"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2018-20852"
},
{
"cve": "CVE-2019-10160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10160"
}
],
"notes": [
{
"category": "general",
"text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10160",
"url": "https://www.suse.com/security/cve/CVE-2019-10160"
},
{
"category": "external",
"summary": "SUSE Bug 1138459 for CVE-2019-10160",
"url": "https://bugzilla.suse.com/1138459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "important"
}
],
"title": "CVE-2019-10160"
},
{
"cve": "CVE-2019-15903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15903"
}
],
"notes": [
{
"category": "general",
"text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15903",
"url": "https://www.suse.com/security/cve/CVE-2019-15903"
},
{
"category": "external",
"summary": "SUSE Bug 1149429 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1149429"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1154738"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "important"
}
],
"title": "CVE-2019-15903"
},
{
"cve": "CVE-2019-16056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16056"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16056",
"url": "https://www.suse.com/security/cve/CVE-2019-16056"
},
{
"category": "external",
"summary": "SUSE Bug 1149955 for CVE-2019-16056",
"url": "https://bugzilla.suse.com/1149955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2019-16056"
},
{
"cve": "CVE-2019-16935",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16935"
}
],
"notes": [
{
"category": "general",
"text": "The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16935",
"url": "https://www.suse.com/security/cve/CVE-2019-16935"
},
{
"category": "external",
"summary": "SUSE Bug 1153238 for CVE-2019-16935",
"url": "https://bugzilla.suse.com/1153238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2019-16935"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9636"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9636",
"url": "https://www.suse.com/security/cve/CVE-2019-9636"
},
{
"category": "external",
"summary": "SUSE Bug 1129346 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1129346"
},
{
"category": "external",
"summary": "SUSE Bug 1135433 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1135433"
},
{
"category": "external",
"summary": "SUSE Bug 1138459 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1138459"
},
{
"category": "external",
"summary": "SUSE Bug 1145004 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1145004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2019-9636"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:libpython3_6m1_0-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-base-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-base-32bit-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-curses-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-dbm-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-devel-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-idle-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-testsuite-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tk-3.6.10-lp151.6.7.1.x86_64",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.i586",
"openSUSE Leap 15.1:python3-tools-3.6.10-lp151.6.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-21T15:12:01Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
}
]
}
opensuse-su-2024:11284-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python36-3.6.15-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python36-3.6.15-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11284",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11284-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0772 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000110 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5636 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5699 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5699/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18207 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000802 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000802/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1060 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1061 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14647 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20406 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20406/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20852 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10160 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15903 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16935 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16935/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18348 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20916 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9636 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9674 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14422 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26116 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27619 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8492 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23336 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3426 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3733 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3737 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3737/"
}
],
"title": "python36-3.6.15-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11284-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python36-3.6.15-1.1.aarch64",
"product": {
"name": "python36-3.6.15-1.1.aarch64",
"product_id": "python36-3.6.15-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-32bit-3.6.15-1.1.aarch64",
"product": {
"name": "python36-32bit-3.6.15-1.1.aarch64",
"product_id": "python36-32bit-3.6.15-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-curses-3.6.15-1.1.aarch64",
"product": {
"name": "python36-curses-3.6.15-1.1.aarch64",
"product_id": "python36-curses-3.6.15-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-dbm-3.6.15-1.1.aarch64",
"product": {
"name": "python36-dbm-3.6.15-1.1.aarch64",
"product_id": "python36-dbm-3.6.15-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-idle-3.6.15-1.1.aarch64",
"product": {
"name": "python36-idle-3.6.15-1.1.aarch64",
"product_id": "python36-idle-3.6.15-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-tk-3.6.15-1.1.aarch64",
"product": {
"name": "python36-tk-3.6.15-1.1.aarch64",
"product_id": "python36-tk-3.6.15-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-3.6.15-1.1.ppc64le",
"product": {
"name": "python36-3.6.15-1.1.ppc64le",
"product_id": "python36-3.6.15-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-32bit-3.6.15-1.1.ppc64le",
"product": {
"name": "python36-32bit-3.6.15-1.1.ppc64le",
"product_id": "python36-32bit-3.6.15-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-curses-3.6.15-1.1.ppc64le",
"product": {
"name": "python36-curses-3.6.15-1.1.ppc64le",
"product_id": "python36-curses-3.6.15-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-dbm-3.6.15-1.1.ppc64le",
"product": {
"name": "python36-dbm-3.6.15-1.1.ppc64le",
"product_id": "python36-dbm-3.6.15-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-idle-3.6.15-1.1.ppc64le",
"product": {
"name": "python36-idle-3.6.15-1.1.ppc64le",
"product_id": "python36-idle-3.6.15-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-tk-3.6.15-1.1.ppc64le",
"product": {
"name": "python36-tk-3.6.15-1.1.ppc64le",
"product_id": "python36-tk-3.6.15-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-3.6.15-1.1.s390x",
"product": {
"name": "python36-3.6.15-1.1.s390x",
"product_id": "python36-3.6.15-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-32bit-3.6.15-1.1.s390x",
"product": {
"name": "python36-32bit-3.6.15-1.1.s390x",
"product_id": "python36-32bit-3.6.15-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-curses-3.6.15-1.1.s390x",
"product": {
"name": "python36-curses-3.6.15-1.1.s390x",
"product_id": "python36-curses-3.6.15-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-dbm-3.6.15-1.1.s390x",
"product": {
"name": "python36-dbm-3.6.15-1.1.s390x",
"product_id": "python36-dbm-3.6.15-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-idle-3.6.15-1.1.s390x",
"product": {
"name": "python36-idle-3.6.15-1.1.s390x",
"product_id": "python36-idle-3.6.15-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-tk-3.6.15-1.1.s390x",
"product": {
"name": "python36-tk-3.6.15-1.1.s390x",
"product_id": "python36-tk-3.6.15-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-3.6.15-1.1.x86_64",
"product": {
"name": "python36-3.6.15-1.1.x86_64",
"product_id": "python36-3.6.15-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-32bit-3.6.15-1.1.x86_64",
"product": {
"name": "python36-32bit-3.6.15-1.1.x86_64",
"product_id": "python36-32bit-3.6.15-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-curses-3.6.15-1.1.x86_64",
"product": {
"name": "python36-curses-3.6.15-1.1.x86_64",
"product_id": "python36-curses-3.6.15-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-dbm-3.6.15-1.1.x86_64",
"product": {
"name": "python36-dbm-3.6.15-1.1.x86_64",
"product_id": "python36-dbm-3.6.15-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-idle-3.6.15-1.1.x86_64",
"product": {
"name": "python36-idle-3.6.15-1.1.x86_64",
"product_id": "python36-idle-3.6.15-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-tk-3.6.15-1.1.x86_64",
"product": {
"name": "python36-tk-3.6.15-1.1.x86_64",
"product_id": "python36-tk-3.6.15-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64"
},
"product_reference": "python36-3.6.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le"
},
"product_reference": "python36-3.6.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-3.6.15-1.1.s390x"
},
"product_reference": "python36-3.6.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64"
},
"product_reference": "python36-3.6.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-32bit-3.6.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64"
},
"product_reference": "python36-32bit-3.6.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-32bit-3.6.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le"
},
"product_reference": "python36-32bit-3.6.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-32bit-3.6.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x"
},
"product_reference": "python36-32bit-3.6.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-32bit-3.6.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64"
},
"product_reference": "python36-32bit-3.6.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-curses-3.6.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64"
},
"product_reference": "python36-curses-3.6.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-curses-3.6.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le"
},
"product_reference": "python36-curses-3.6.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-curses-3.6.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x"
},
"product_reference": "python36-curses-3.6.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-curses-3.6.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64"
},
"product_reference": "python36-curses-3.6.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-dbm-3.6.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64"
},
"product_reference": "python36-dbm-3.6.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-dbm-3.6.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le"
},
"product_reference": "python36-dbm-3.6.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-dbm-3.6.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x"
},
"product_reference": "python36-dbm-3.6.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-dbm-3.6.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64"
},
"product_reference": "python36-dbm-3.6.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-idle-3.6.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64"
},
"product_reference": "python36-idle-3.6.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-idle-3.6.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le"
},
"product_reference": "python36-idle-3.6.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-idle-3.6.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x"
},
"product_reference": "python36-idle-3.6.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-idle-3.6.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64"
},
"product_reference": "python36-idle-3.6.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-tk-3.6.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64"
},
"product_reference": "python36-tk-3.6.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-tk-3.6.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le"
},
"product_reference": "python36-tk-3.6.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-tk-3.6.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x"
},
"product_reference": "python36-tk-3.6.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-tk-3.6.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
},
"product_reference": "python36-tk-3.6.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2016-0772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0772"
}
],
"notes": [
{
"category": "general",
"text": "The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a \"StartTLS stripping attack.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0772",
"url": "https://www.suse.com/security/cve/CVE-2016-0772"
},
{
"category": "external",
"summary": "SUSE Bug 984751 for CVE-2016-0772",
"url": "https://bugzilla.suse.com/984751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-0772"
},
{
"cve": "CVE-2016-1000110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000110"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000110",
"url": "https://www.suse.com/security/cve/CVE-2016-1000110"
},
{
"category": "external",
"summary": "SUSE Bug 988484 for CVE-2016-1000110",
"url": "https://bugzilla.suse.com/988484"
},
{
"category": "external",
"summary": "SUSE Bug 989523 for CVE-2016-1000110",
"url": "https://bugzilla.suse.com/989523"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1000110"
},
{
"cve": "CVE-2016-5636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5636"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5636",
"url": "https://www.suse.com/security/cve/CVE-2016-5636"
},
{
"category": "external",
"summary": "SUSE Bug 1065451 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/1065451"
},
{
"category": "external",
"summary": "SUSE Bug 1106262 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/1106262"
},
{
"category": "external",
"summary": "SUSE Bug 985177 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/985177"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-5636"
},
{
"cve": "CVE-2016-5699",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5699"
}
],
"notes": [
{
"category": "general",
"text": "CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5699",
"url": "https://www.suse.com/security/cve/CVE-2016-5699"
},
{
"category": "external",
"summary": "SUSE Bug 1122729 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/1122729"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 985348 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/985348"
},
{
"category": "external",
"summary": "SUSE Bug 985351 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/985351"
},
{
"category": "external",
"summary": "SUSE Bug 986630 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/986630"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-5699"
},
{
"cve": "CVE-2017-18207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18207"
}
],
"notes": [
{
"category": "general",
"text": "The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18207",
"url": "https://www.suse.com/security/cve/CVE-2017-18207"
},
{
"category": "external",
"summary": "SUSE Bug 1083507 for CVE-2017-18207",
"url": "https://bugzilla.suse.com/1083507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-18207"
},
{
"cve": "CVE-2018-1000802",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000802"
}
],
"notes": [
{
"category": "general",
"text": "Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000802",
"url": "https://www.suse.com/security/cve/CVE-2018-1000802"
},
{
"category": "external",
"summary": "SUSE Bug 1109663 for CVE-2018-1000802",
"url": "https://bugzilla.suse.com/1109663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000802"
},
{
"cve": "CVE-2018-1060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1060"
}
],
"notes": [
{
"category": "general",
"text": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib\u0027s apop() method. An attacker could use this flaw to cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1060",
"url": "https://www.suse.com/security/cve/CVE-2018-1060"
},
{
"category": "external",
"summary": "SUSE Bug 1088009 for CVE-2018-1060",
"url": "https://bugzilla.suse.com/1088009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-1060"
},
{
"cve": "CVE-2018-1061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1061"
}
],
"notes": [
{
"category": "general",
"text": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1061",
"url": "https://www.suse.com/security/cve/CVE-2018-1061"
},
{
"category": "external",
"summary": "SUSE Bug 1088004 for CVE-2018-1061",
"url": "https://bugzilla.suse.com/1088004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-1061"
},
{
"cve": "CVE-2018-14647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14647"
}
],
"notes": [
{
"category": "general",
"text": "Python\u0027s elementtree C accelerator failed to initialise Expat\u0027s hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat\u0027s internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14647",
"url": "https://www.suse.com/security/cve/CVE-2018-14647"
},
{
"category": "external",
"summary": "SUSE Bug 1109847 for CVE-2018-14647",
"url": "https://bugzilla.suse.com/1109847"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2018-14647",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-14647"
},
{
"cve": "CVE-2018-20406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20406"
}
],
"notes": [
{
"category": "general",
"text": "Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a \"resize to twice the size\" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20406",
"url": "https://www.suse.com/security/cve/CVE-2018-20406"
},
{
"category": "external",
"summary": "SUSE Bug 1120644 for CVE-2018-20406",
"url": "https://bugzilla.suse.com/1120644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20406"
},
{
"cve": "CVE-2018-20852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20852"
}
],
"notes": [
{
"category": "general",
"text": "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20852",
"url": "https://www.suse.com/security/cve/CVE-2018-20852"
},
{
"category": "external",
"summary": "SUSE Bug 1141853 for CVE-2018-20852",
"url": "https://bugzilla.suse.com/1141853"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20852"
},
{
"cve": "CVE-2019-10160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10160"
}
],
"notes": [
{
"category": "general",
"text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10160",
"url": "https://www.suse.com/security/cve/CVE-2019-10160"
},
{
"category": "external",
"summary": "SUSE Bug 1138459 for CVE-2019-10160",
"url": "https://bugzilla.suse.com/1138459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-10160"
},
{
"cve": "CVE-2019-15903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15903"
}
],
"notes": [
{
"category": "general",
"text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15903",
"url": "https://www.suse.com/security/cve/CVE-2019-15903"
},
{
"category": "external",
"summary": "SUSE Bug 1149429 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1149429"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1154738"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-15903"
},
{
"cve": "CVE-2019-16056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16056"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16056",
"url": "https://www.suse.com/security/cve/CVE-2019-16056"
},
{
"category": "external",
"summary": "SUSE Bug 1149955 for CVE-2019-16056",
"url": "https://bugzilla.suse.com/1149955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16056"
},
{
"cve": "CVE-2019-16935",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16935"
}
],
"notes": [
{
"category": "general",
"text": "The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16935",
"url": "https://www.suse.com/security/cve/CVE-2019-16935"
},
{
"category": "external",
"summary": "SUSE Bug 1153238 for CVE-2019-16935",
"url": "https://bugzilla.suse.com/1153238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16935"
},
{
"cve": "CVE-2019-18348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18348"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18348",
"url": "https://www.suse.com/security/cve/CVE-2019-18348"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-18348",
"url": "https://bugzilla.suse.com/1155094"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18348"
},
{
"cve": "CVE-2019-20907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20907"
}
],
"notes": [
{
"category": "general",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20907",
"url": "https://www.suse.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "SUSE Bug 1174091 for CVE-2019-20907",
"url": "https://bugzilla.suse.com/1174091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-20916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20916"
}
],
"notes": [
{
"category": "general",
"text": "The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20916",
"url": "https://www.suse.com/security/cve/CVE-2019-20916"
},
{
"category": "external",
"summary": "SUSE Bug 1176262 for CVE-2019-20916",
"url": "https://bugzilla.suse.com/1176262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20916"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9636"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9636",
"url": "https://www.suse.com/security/cve/CVE-2019-9636"
},
{
"category": "external",
"summary": "SUSE Bug 1129346 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1129346"
},
{
"category": "external",
"summary": "SUSE Bug 1135433 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1135433"
},
{
"category": "external",
"summary": "SUSE Bug 1138459 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1138459"
},
{
"category": "external",
"summary": "SUSE Bug 1145004 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1145004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9636"
},
{
"cve": "CVE-2019-9674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9674"
}
],
"notes": [
{
"category": "general",
"text": "Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9674",
"url": "https://www.suse.com/security/cve/CVE-2019-9674"
},
{
"category": "external",
"summary": "SUSE Bug 1162825 for CVE-2019-9674",
"url": "https://bugzilla.suse.com/1162825"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9674"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2020-14422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14422"
}
],
"notes": [
{
"category": "general",
"text": "Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14422",
"url": "https://www.suse.com/security/cve/CVE-2020-14422"
},
{
"category": "external",
"summary": "SUSE Bug 1173274 for CVE-2020-14422",
"url": "https://bugzilla.suse.com/1173274"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14422"
},
{
"cve": "CVE-2020-26116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26116"
}
],
"notes": [
{
"category": "general",
"text": "http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26116",
"url": "https://www.suse.com/security/cve/CVE-2020-26116"
},
{
"category": "external",
"summary": "SUSE Bug 1177120 for CVE-2020-26116",
"url": "https://bugzilla.suse.com/1177120"
},
{
"category": "external",
"summary": "SUSE Bug 1177211 for CVE-2020-26116",
"url": "https://bugzilla.suse.com/1177211"
},
{
"category": "external",
"summary": "SUSE Bug 1192361 for CVE-2020-26116",
"url": "https://bugzilla.suse.com/1192361"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-26116"
},
{
"cve": "CVE-2020-27619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27619"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27619",
"url": "https://www.suse.com/security/cve/CVE-2020-27619"
},
{
"category": "external",
"summary": "SUSE Bug 1178009 for CVE-2020-27619",
"url": "https://bugzilla.suse.com/1178009"
},
{
"category": "external",
"summary": "SUSE Bug 1180254 for CVE-2020-27619",
"url": "https://bugzilla.suse.com/1180254"
},
{
"category": "external",
"summary": "SUSE Bug 1193386 for CVE-2020-27619",
"url": "https://bugzilla.suse.com/1193386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-27619"
},
{
"cve": "CVE-2020-8492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8492"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8492",
"url": "https://www.suse.com/security/cve/CVE-2020-8492"
},
{
"category": "external",
"summary": "SUSE Bug 1162367 for CVE-2020-8492",
"url": "https://bugzilla.suse.com/1162367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2021-23336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23336"
}
],
"notes": [
{
"category": "general",
"text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23336",
"url": "https://www.suse.com/security/cve/CVE-2021-23336"
},
{
"category": "external",
"summary": "SUSE Bug 1182179 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182179"
},
{
"category": "external",
"summary": "SUSE Bug 1182379 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182379"
},
{
"category": "external",
"summary": "SUSE Bug 1182433 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3177"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3177",
"url": "https://www.suse.com/security/cve/CVE-2021-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1181126 for CVE-2021-3177",
"url": "https://bugzilla.suse.com/1181126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-3426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3426"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3426",
"url": "https://www.suse.com/security/cve/CVE-2021-3426"
},
{
"category": "external",
"summary": "SUSE Bug 1183374 for CVE-2021-3426",
"url": "https://bugzilla.suse.com/1183374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3426"
},
{
"cve": "CVE-2021-3733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3733"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in urllib\u0027s AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3733",
"url": "https://www.suse.com/security/cve/CVE-2021-3733"
},
{
"category": "external",
"summary": "SUSE Bug 1189287 for CVE-2021-3733",
"url": "https://bugzilla.suse.com/1189287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3733"
},
{
"cve": "CVE-2021-3737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3737"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3737",
"url": "https://www.suse.com/security/cve/CVE-2021-3737"
},
{
"category": "external",
"summary": "SUSE Bug 1189241 for CVE-2021-3737",
"url": "https://bugzilla.suse.com/1189241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-32bit-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-curses-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-dbm-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-idle-3.6.15-1.1.x86_64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.aarch64",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.ppc64le",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.s390x",
"openSUSE Tumbleweed:python36-tk-3.6.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3737"
}
]
}
opensuse-su-2024:10194-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "fetchmail-6.3.26-13.4 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the fetchmail-6.3.26-13.4 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10194",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10194-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-2666 page",
"url": "https://www.suse.com/security/cve/CVE-2009-2666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-1167 page",
"url": "https://www.suse.com/security/cve/CVE-2010-1167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-1947 page",
"url": "https://www.suse.com/security/cve/CVE-2011-1947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3482 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3482/"
}
],
"title": "fetchmail-6.3.26-13.4 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10194-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.3.26-13.4.aarch64",
"product": {
"name": "fetchmail-6.3.26-13.4.aarch64",
"product_id": "fetchmail-6.3.26-13.4.aarch64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.3.26-13.4.aarch64",
"product": {
"name": "fetchmailconf-6.3.26-13.4.aarch64",
"product_id": "fetchmailconf-6.3.26-13.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.3.26-13.4.ppc64le",
"product": {
"name": "fetchmail-6.3.26-13.4.ppc64le",
"product_id": "fetchmail-6.3.26-13.4.ppc64le"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.3.26-13.4.ppc64le",
"product": {
"name": "fetchmailconf-6.3.26-13.4.ppc64le",
"product_id": "fetchmailconf-6.3.26-13.4.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.3.26-13.4.s390x",
"product": {
"name": "fetchmail-6.3.26-13.4.s390x",
"product_id": "fetchmail-6.3.26-13.4.s390x"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.3.26-13.4.s390x",
"product": {
"name": "fetchmailconf-6.3.26-13.4.s390x",
"product_id": "fetchmailconf-6.3.26-13.4.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.3.26-13.4.x86_64",
"product": {
"name": "fetchmail-6.3.26-13.4.x86_64",
"product_id": "fetchmail-6.3.26-13.4.x86_64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.3.26-13.4.x86_64",
"product": {
"name": "fetchmailconf-6.3.26-13.4.x86_64",
"product_id": "fetchmailconf-6.3.26-13.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.3.26-13.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64"
},
"product_reference": "fetchmail-6.3.26-13.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.3.26-13.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le"
},
"product_reference": "fetchmail-6.3.26-13.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.3.26-13.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x"
},
"product_reference": "fetchmail-6.3.26-13.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.3.26-13.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64"
},
"product_reference": "fetchmail-6.3.26-13.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.3.26-13.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64"
},
"product_reference": "fetchmailconf-6.3.26-13.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.3.26-13.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le"
},
"product_reference": "fetchmailconf-6.3.26-13.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.3.26-13.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x"
},
"product_reference": "fetchmailconf-6.3.26-13.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.3.26-13.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
},
"product_reference": "fetchmailconf-6.3.26-13.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-2666"
}
],
"notes": [
{
"category": "general",
"text": "socket.c in fetchmail before 6.3.11 does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-2666",
"url": "https://www.suse.com/security/cve/CVE-2009-2666"
},
{
"category": "external",
"summary": "SUSE Bug 528746 for CVE-2009-2666",
"url": "https://bugzilla.suse.com/528746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-2666"
},
{
"cve": "CVE-2010-1167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-1167"
}
],
"notes": [
{
"category": "general",
"text": "fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-1167",
"url": "https://www.suse.com/security/cve/CVE-2010-1167"
},
{
"category": "external",
"summary": "SUSE Bug 597673 for CVE-2010-1167",
"url": "https://bugzilla.suse.com/597673"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-1167"
},
{
"cve": "CVE-2011-1947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-1947"
}
],
"notes": [
{
"category": "general",
"text": "fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-1947",
"url": "https://www.suse.com/security/cve/CVE-2011-1947"
},
{
"category": "external",
"summary": "SUSE Bug 697368 for CVE-2011-1947",
"url": "https://bugzilla.suse.com/697368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-1947"
},
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2012-3482",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3482"
}
],
"notes": [
{
"category": "general",
"text": "Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3482",
"url": "https://www.suse.com/security/cve/CVE-2012-3482"
},
{
"category": "external",
"summary": "SUSE Bug 775988 for CVE-2012-3482",
"url": "https://bugzilla.suse.com/775988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmail-6.3.26-13.4.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.3.26-13.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-3482"
}
]
}
opensuse-su-2024:10536-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libpython2_7-1_0-2.7.12-1.4 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libpython2_7-1_0-2.7.12-1.4 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10536",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10536-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-1521 page",
"url": "https://www.suse.com/security/cve/CVE-2011-1521/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1753 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-1912 page",
"url": "https://www.suse.com/security/cve/CVE-2014-1912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7185 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0772 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5636 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5699 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5699/"
}
],
"title": "libpython2_7-1_0-2.7.12-1.4 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10536-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython2_7-1_0-2.7.12-1.4.aarch64",
"product": {
"name": "libpython2_7-1_0-2.7.12-1.4.aarch64",
"product_id": "libpython2_7-1_0-2.7.12-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"product": {
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"product_id": "libpython2_7-1_0-32bit-2.7.12-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "python-base-2.7.12-1.4.aarch64",
"product": {
"name": "python-base-2.7.12-1.4.aarch64",
"product_id": "python-base-2.7.12-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "python-base-32bit-2.7.12-1.4.aarch64",
"product": {
"name": "python-base-32bit-2.7.12-1.4.aarch64",
"product_id": "python-base-32bit-2.7.12-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "python-devel-2.7.12-1.4.aarch64",
"product": {
"name": "python-devel-2.7.12-1.4.aarch64",
"product_id": "python-devel-2.7.12-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "python-xml-2.7.12-1.4.aarch64",
"product": {
"name": "python-xml-2.7.12-1.4.aarch64",
"product_id": "python-xml-2.7.12-1.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython2_7-1_0-2.7.12-1.4.ppc64le",
"product": {
"name": "libpython2_7-1_0-2.7.12-1.4.ppc64le",
"product_id": "libpython2_7-1_0-2.7.12-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"product": {
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"product_id": "libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "python-base-2.7.12-1.4.ppc64le",
"product": {
"name": "python-base-2.7.12-1.4.ppc64le",
"product_id": "python-base-2.7.12-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "python-base-32bit-2.7.12-1.4.ppc64le",
"product": {
"name": "python-base-32bit-2.7.12-1.4.ppc64le",
"product_id": "python-base-32bit-2.7.12-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "python-devel-2.7.12-1.4.ppc64le",
"product": {
"name": "python-devel-2.7.12-1.4.ppc64le",
"product_id": "python-devel-2.7.12-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "python-xml-2.7.12-1.4.ppc64le",
"product": {
"name": "python-xml-2.7.12-1.4.ppc64le",
"product_id": "python-xml-2.7.12-1.4.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython2_7-1_0-2.7.12-1.4.s390x",
"product": {
"name": "libpython2_7-1_0-2.7.12-1.4.s390x",
"product_id": "libpython2_7-1_0-2.7.12-1.4.s390x"
}
},
{
"category": "product_version",
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"product": {
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"product_id": "libpython2_7-1_0-32bit-2.7.12-1.4.s390x"
}
},
{
"category": "product_version",
"name": "python-base-2.7.12-1.4.s390x",
"product": {
"name": "python-base-2.7.12-1.4.s390x",
"product_id": "python-base-2.7.12-1.4.s390x"
}
},
{
"category": "product_version",
"name": "python-base-32bit-2.7.12-1.4.s390x",
"product": {
"name": "python-base-32bit-2.7.12-1.4.s390x",
"product_id": "python-base-32bit-2.7.12-1.4.s390x"
}
},
{
"category": "product_version",
"name": "python-devel-2.7.12-1.4.s390x",
"product": {
"name": "python-devel-2.7.12-1.4.s390x",
"product_id": "python-devel-2.7.12-1.4.s390x"
}
},
{
"category": "product_version",
"name": "python-xml-2.7.12-1.4.s390x",
"product": {
"name": "python-xml-2.7.12-1.4.s390x",
"product_id": "python-xml-2.7.12-1.4.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython2_7-1_0-2.7.12-1.4.x86_64",
"product": {
"name": "libpython2_7-1_0-2.7.12-1.4.x86_64",
"product_id": "libpython2_7-1_0-2.7.12-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"product": {
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"product_id": "libpython2_7-1_0-32bit-2.7.12-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "python-base-2.7.12-1.4.x86_64",
"product": {
"name": "python-base-2.7.12-1.4.x86_64",
"product_id": "python-base-2.7.12-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "python-base-32bit-2.7.12-1.4.x86_64",
"product": {
"name": "python-base-32bit-2.7.12-1.4.x86_64",
"product_id": "python-base-32bit-2.7.12-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "python-devel-2.7.12-1.4.x86_64",
"product": {
"name": "python-devel-2.7.12-1.4.x86_64",
"product_id": "python-devel-2.7.12-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "python-xml-2.7.12-1.4.x86_64",
"product": {
"name": "python-xml-2.7.12-1.4.x86_64",
"product_id": "python-xml-2.7.12-1.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.12-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64"
},
"product_reference": "libpython2_7-1_0-2.7.12-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.12-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le"
},
"product_reference": "libpython2_7-1_0-2.7.12-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.12-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x"
},
"product_reference": "libpython2_7-1_0-2.7.12-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.12-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64"
},
"product_reference": "libpython2_7-1_0-2.7.12-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64"
},
"product_reference": "libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le"
},
"product_reference": "libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x"
},
"product_reference": "libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-32bit-2.7.12-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64"
},
"product_reference": "libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.12-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64"
},
"product_reference": "python-base-2.7.12-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.12-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le"
},
"product_reference": "python-base-2.7.12-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.12-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x"
},
"product_reference": "python-base-2.7.12-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.12-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64"
},
"product_reference": "python-base-2.7.12-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-32bit-2.7.12-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64"
},
"product_reference": "python-base-32bit-2.7.12-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-32bit-2.7.12-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le"
},
"product_reference": "python-base-32bit-2.7.12-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-32bit-2.7.12-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x"
},
"product_reference": "python-base-32bit-2.7.12-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-32bit-2.7.12-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64"
},
"product_reference": "python-base-32bit-2.7.12-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.12-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64"
},
"product_reference": "python-devel-2.7.12-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.12-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le"
},
"product_reference": "python-devel-2.7.12-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.12-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x"
},
"product_reference": "python-devel-2.7.12-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.12-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64"
},
"product_reference": "python-devel-2.7.12-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.12-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64"
},
"product_reference": "python-xml-2.7.12-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.12-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le"
},
"product_reference": "python-xml-2.7.12-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.12-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x"
},
"product_reference": "python-xml-2.7.12-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.12-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
},
"product_reference": "python-xml-2.7.12-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-1521",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-1521"
}
],
"notes": [
{
"category": "general",
"text": "The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-1521",
"url": "https://www.suse.com/security/cve/CVE-2011-1521"
},
{
"category": "external",
"summary": "SUSE Bug 682554 for CVE-2011-1521",
"url": "https://bugzilla.suse.com/682554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-1521"
},
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-1753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1753"
}
],
"notes": [
{
"category": "general",
"text": "The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1753",
"url": "https://www.suse.com/security/cve/CVE-2013-1753"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1753",
"url": "https://bugzilla.suse.com/856835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1753"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-1912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-1912"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-1912",
"url": "https://www.suse.com/security/cve/CVE-2014-1912"
},
{
"category": "external",
"summary": "SUSE Bug 1049392 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/1049392"
},
{
"category": "external",
"summary": "SUSE Bug 1049422 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/1049422"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-1912"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2014-7185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7185"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a \"buffer\" function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7185",
"url": "https://www.suse.com/security/cve/CVE-2014-7185"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/912739"
},
{
"category": "external",
"summary": "SUSE Bug 913479 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/913479"
},
{
"category": "external",
"summary": "SUSE Bug 955182 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/955182"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-7185"
},
{
"cve": "CVE-2016-0772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0772"
}
],
"notes": [
{
"category": "general",
"text": "The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a \"StartTLS stripping attack.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0772",
"url": "https://www.suse.com/security/cve/CVE-2016-0772"
},
{
"category": "external",
"summary": "SUSE Bug 984751 for CVE-2016-0772",
"url": "https://bugzilla.suse.com/984751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-0772"
},
{
"cve": "CVE-2016-5636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5636"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5636",
"url": "https://www.suse.com/security/cve/CVE-2016-5636"
},
{
"category": "external",
"summary": "SUSE Bug 1065451 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/1065451"
},
{
"category": "external",
"summary": "SUSE Bug 1106262 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/1106262"
},
{
"category": "external",
"summary": "SUSE Bug 985177 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/985177"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-5636"
},
{
"cve": "CVE-2016-5699",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5699"
}
],
"notes": [
{
"category": "general",
"text": "CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5699",
"url": "https://www.suse.com/security/cve/CVE-2016-5699"
},
{
"category": "external",
"summary": "SUSE Bug 1122729 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/1122729"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 985348 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/985348"
},
{
"category": "external",
"summary": "SUSE Bug 985351 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/985351"
},
{
"category": "external",
"summary": "SUSE Bug 986630 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/986630"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:libpython2_7-1_0-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-base-32bit-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-devel-2.7.12-1.4.x86_64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.aarch64",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.ppc64le",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.s390x",
"openSUSE Tumbleweed:python-xml-2.7.12-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-5699"
}
]
}
opensuse-su-2024:12910-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python312-3.12.0a7-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python312-3.12.0a7-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12910",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12910-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10735 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15523 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15801 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8492 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23336 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3426 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-25236 page",
"url": "https://www.suse.com/security/cve/CVE-2022-25236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42919 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45061 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45061/"
}
],
"title": "python312-3.12.0a7-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12910-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python312-3.12.0a7-1.1.aarch64",
"product": {
"name": "python312-3.12.0a7-1.1.aarch64",
"product_id": "python312-3.12.0a7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.0a7-1.1.aarch64",
"product": {
"name": "python312-curses-3.12.0a7-1.1.aarch64",
"product_id": "python312-curses-3.12.0a7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.0a7-1.1.aarch64",
"product": {
"name": "python312-dbm-3.12.0a7-1.1.aarch64",
"product_id": "python312-dbm-3.12.0a7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.0a7-1.1.aarch64",
"product": {
"name": "python312-idle-3.12.0a7-1.1.aarch64",
"product_id": "python312-idle-3.12.0a7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.0a7-1.1.aarch64",
"product": {
"name": "python312-tk-3.12.0a7-1.1.aarch64",
"product_id": "python312-tk-3.12.0a7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"product": {
"name": "python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"product_id": "python312-x86-64-v3-3.12.0a7-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python312-3.12.0a7-1.1.ppc64le",
"product": {
"name": "python312-3.12.0a7-1.1.ppc64le",
"product_id": "python312-3.12.0a7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.0a7-1.1.ppc64le",
"product": {
"name": "python312-curses-3.12.0a7-1.1.ppc64le",
"product_id": "python312-curses-3.12.0a7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.0a7-1.1.ppc64le",
"product": {
"name": "python312-dbm-3.12.0a7-1.1.ppc64le",
"product_id": "python312-dbm-3.12.0a7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.0a7-1.1.ppc64le",
"product": {
"name": "python312-idle-3.12.0a7-1.1.ppc64le",
"product_id": "python312-idle-3.12.0a7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.0a7-1.1.ppc64le",
"product": {
"name": "python312-tk-3.12.0a7-1.1.ppc64le",
"product_id": "python312-tk-3.12.0a7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"product": {
"name": "python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"product_id": "python312-x86-64-v3-3.12.0a7-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python312-3.12.0a7-1.1.s390x",
"product": {
"name": "python312-3.12.0a7-1.1.s390x",
"product_id": "python312-3.12.0a7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.0a7-1.1.s390x",
"product": {
"name": "python312-curses-3.12.0a7-1.1.s390x",
"product_id": "python312-curses-3.12.0a7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.0a7-1.1.s390x",
"product": {
"name": "python312-dbm-3.12.0a7-1.1.s390x",
"product_id": "python312-dbm-3.12.0a7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.0a7-1.1.s390x",
"product": {
"name": "python312-idle-3.12.0a7-1.1.s390x",
"product_id": "python312-idle-3.12.0a7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.0a7-1.1.s390x",
"product": {
"name": "python312-tk-3.12.0a7-1.1.s390x",
"product_id": "python312-tk-3.12.0a7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-x86-64-v3-3.12.0a7-1.1.s390x",
"product": {
"name": "python312-x86-64-v3-3.12.0a7-1.1.s390x",
"product_id": "python312-x86-64-v3-3.12.0a7-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python312-3.12.0a7-1.1.x86_64",
"product": {
"name": "python312-3.12.0a7-1.1.x86_64",
"product_id": "python312-3.12.0a7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.0a7-1.1.x86_64",
"product": {
"name": "python312-curses-3.12.0a7-1.1.x86_64",
"product_id": "python312-curses-3.12.0a7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.0a7-1.1.x86_64",
"product": {
"name": "python312-dbm-3.12.0a7-1.1.x86_64",
"product_id": "python312-dbm-3.12.0a7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.0a7-1.1.x86_64",
"product": {
"name": "python312-idle-3.12.0a7-1.1.x86_64",
"product_id": "python312-idle-3.12.0a7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.0a7-1.1.x86_64",
"product": {
"name": "python312-tk-3.12.0a7-1.1.x86_64",
"product_id": "python312-tk-3.12.0a7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-x86-64-v3-3.12.0a7-1.1.x86_64",
"product": {
"name": "python312-x86-64-v3-3.12.0a7-1.1.x86_64",
"product_id": "python312-x86-64-v3-3.12.0a7-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.0a7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64"
},
"product_reference": "python312-3.12.0a7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.0a7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le"
},
"product_reference": "python312-3.12.0a7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.0a7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x"
},
"product_reference": "python312-3.12.0a7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.0a7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64"
},
"product_reference": "python312-3.12.0a7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.0a7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64"
},
"product_reference": "python312-curses-3.12.0a7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.0a7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le"
},
"product_reference": "python312-curses-3.12.0a7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.0a7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x"
},
"product_reference": "python312-curses-3.12.0a7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.0a7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64"
},
"product_reference": "python312-curses-3.12.0a7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.0a7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64"
},
"product_reference": "python312-dbm-3.12.0a7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.0a7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le"
},
"product_reference": "python312-dbm-3.12.0a7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.0a7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x"
},
"product_reference": "python312-dbm-3.12.0a7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.0a7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64"
},
"product_reference": "python312-dbm-3.12.0a7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.0a7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64"
},
"product_reference": "python312-idle-3.12.0a7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.0a7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le"
},
"product_reference": "python312-idle-3.12.0a7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.0a7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x"
},
"product_reference": "python312-idle-3.12.0a7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.0a7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64"
},
"product_reference": "python312-idle-3.12.0a7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.0a7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64"
},
"product_reference": "python312-tk-3.12.0a7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.0a7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le"
},
"product_reference": "python312-tk-3.12.0a7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.0a7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x"
},
"product_reference": "python312-tk-3.12.0a7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.0a7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64"
},
"product_reference": "python312-tk-3.12.0a7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-x86-64-v3-3.12.0a7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64"
},
"product_reference": "python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-x86-64-v3-3.12.0a7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le"
},
"product_reference": "python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-x86-64-v3-3.12.0a7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x"
},
"product_reference": "python312-x86-64-v3-3.12.0a7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-x86-64-v3-3.12.0a7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
},
"product_reference": "python312-x86-64-v3-3.12.0a7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2019-20907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20907"
}
],
"notes": [
{
"category": "general",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20907",
"url": "https://www.suse.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "SUSE Bug 1174091 for CVE-2019-20907",
"url": "https://bugzilla.suse.com/1174091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2020-10735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10735"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10735",
"url": "https://www.suse.com/security/cve/CVE-2020-10735"
},
{
"category": "external",
"summary": "SUSE Bug 1203125 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1203125"
},
{
"category": "external",
"summary": "SUSE Bug 1204077 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204077"
},
{
"category": "external",
"summary": "SUSE Bug 1204096 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204096"
},
{
"category": "external",
"summary": "SUSE Bug 1204097 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204097"
},
{
"category": "external",
"summary": "SUSE Bug 1205075 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1205075"
},
{
"category": "external",
"summary": "SUSE Bug 1208131 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1208131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-15523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15523"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15523",
"url": "https://www.suse.com/security/cve/CVE-2020-15523"
},
{
"category": "external",
"summary": "SUSE Bug 1173745 for CVE-2020-15523",
"url": "https://bugzilla.suse.com/1173745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15523"
},
{
"cve": "CVE-2020-15801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15801"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15801",
"url": "https://www.suse.com/security/cve/CVE-2020-15801"
},
{
"category": "external",
"summary": "SUSE Bug 1174241 for CVE-2020-15801",
"url": "https://bugzilla.suse.com/1174241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-15801"
},
{
"cve": "CVE-2020-8492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8492"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8492",
"url": "https://www.suse.com/security/cve/CVE-2020-8492"
},
{
"category": "external",
"summary": "SUSE Bug 1162367 for CVE-2020-8492",
"url": "https://bugzilla.suse.com/1162367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2021-23336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23336"
}
],
"notes": [
{
"category": "general",
"text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23336",
"url": "https://www.suse.com/security/cve/CVE-2021-23336"
},
{
"category": "external",
"summary": "SUSE Bug 1182179 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182179"
},
{
"category": "external",
"summary": "SUSE Bug 1182379 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182379"
},
{
"category": "external",
"summary": "SUSE Bug 1182433 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3177"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3177",
"url": "https://www.suse.com/security/cve/CVE-2021-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1181126 for CVE-2021-3177",
"url": "https://bugzilla.suse.com/1181126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-3426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3426"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3426",
"url": "https://www.suse.com/security/cve/CVE-2021-3426"
},
{
"category": "external",
"summary": "SUSE Bug 1183374 for CVE-2021-3426",
"url": "https://bugzilla.suse.com/1183374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3426"
},
{
"cve": "CVE-2022-25236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-25236"
}
],
"notes": [
{
"category": "general",
"text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-25236",
"url": "https://www.suse.com/security/cve/CVE-2022-25236"
},
{
"category": "external",
"summary": "SUSE Bug 1196025 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196025"
},
{
"category": "external",
"summary": "SUSE Bug 1196784 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196784"
},
{
"category": "external",
"summary": "SUSE Bug 1197217 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1197217"
},
{
"category": "external",
"summary": "SUSE Bug 1200038 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1200038"
},
{
"category": "external",
"summary": "SUSE Bug 1201735 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1201735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-42919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42919"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42919",
"url": "https://www.suse.com/security/cve/CVE-2022-42919"
},
{
"category": "external",
"summary": "SUSE Bug 1204886 for CVE-2022-42919",
"url": "https://bugzilla.suse.com/1204886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45061"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45061",
"url": "https://www.suse.com/security/cve/CVE-2022-45061"
},
{
"category": "external",
"summary": "SUSE Bug 1205244 for CVE-2022-45061",
"url": "https://bugzilla.suse.com/1205244"
},
{
"category": "external",
"summary": "SUSE Bug 1211488 for CVE-2022-45061",
"url": "https://bugzilla.suse.com/1211488"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.0a7-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.0a7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45061"
}
]
}
opensuse-su-2024:10426-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libpython3_5m1_0-3.5.1-3.6 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libpython3_5m1_0-3.5.1-3.6 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10426",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10426-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
}
],
"title": "libpython3_5m1_0-3.5.1-3.6 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10426-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_5m1_0-3.5.1-3.6.aarch64",
"product": {
"name": "libpython3_5m1_0-3.5.1-3.6.aarch64",
"product_id": "libpython3_5m1_0-3.5.1-3.6.aarch64"
}
},
{
"category": "product_version",
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"product": {
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"product_id": "libpython3_5m1_0-32bit-3.5.1-3.6.aarch64"
}
},
{
"category": "product_version",
"name": "python3-base-3.5.1-3.6.aarch64",
"product": {
"name": "python3-base-3.5.1-3.6.aarch64",
"product_id": "python3-base-3.5.1-3.6.aarch64"
}
},
{
"category": "product_version",
"name": "python3-base-32bit-3.5.1-3.6.aarch64",
"product": {
"name": "python3-base-32bit-3.5.1-3.6.aarch64",
"product_id": "python3-base-32bit-3.5.1-3.6.aarch64"
}
},
{
"category": "product_version",
"name": "python3-devel-3.5.1-3.6.aarch64",
"product": {
"name": "python3-devel-3.5.1-3.6.aarch64",
"product_id": "python3-devel-3.5.1-3.6.aarch64"
}
},
{
"category": "product_version",
"name": "python3-idle-3.5.1-3.6.aarch64",
"product": {
"name": "python3-idle-3.5.1-3.6.aarch64",
"product_id": "python3-idle-3.5.1-3.6.aarch64"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.5.1-3.6.aarch64",
"product": {
"name": "python3-testsuite-3.5.1-3.6.aarch64",
"product_id": "python3-testsuite-3.5.1-3.6.aarch64"
}
},
{
"category": "product_version",
"name": "python3-tools-3.5.1-3.6.aarch64",
"product": {
"name": "python3-tools-3.5.1-3.6.aarch64",
"product_id": "python3-tools-3.5.1-3.6.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_5m1_0-3.5.1-3.6.ppc64le",
"product": {
"name": "libpython3_5m1_0-3.5.1-3.6.ppc64le",
"product_id": "libpython3_5m1_0-3.5.1-3.6.ppc64le"
}
},
{
"category": "product_version",
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"product": {
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"product_id": "libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-base-3.5.1-3.6.ppc64le",
"product": {
"name": "python3-base-3.5.1-3.6.ppc64le",
"product_id": "python3-base-3.5.1-3.6.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-base-32bit-3.5.1-3.6.ppc64le",
"product": {
"name": "python3-base-32bit-3.5.1-3.6.ppc64le",
"product_id": "python3-base-32bit-3.5.1-3.6.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-devel-3.5.1-3.6.ppc64le",
"product": {
"name": "python3-devel-3.5.1-3.6.ppc64le",
"product_id": "python3-devel-3.5.1-3.6.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-idle-3.5.1-3.6.ppc64le",
"product": {
"name": "python3-idle-3.5.1-3.6.ppc64le",
"product_id": "python3-idle-3.5.1-3.6.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.5.1-3.6.ppc64le",
"product": {
"name": "python3-testsuite-3.5.1-3.6.ppc64le",
"product_id": "python3-testsuite-3.5.1-3.6.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-tools-3.5.1-3.6.ppc64le",
"product": {
"name": "python3-tools-3.5.1-3.6.ppc64le",
"product_id": "python3-tools-3.5.1-3.6.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_5m1_0-3.5.1-3.6.s390x",
"product": {
"name": "libpython3_5m1_0-3.5.1-3.6.s390x",
"product_id": "libpython3_5m1_0-3.5.1-3.6.s390x"
}
},
{
"category": "product_version",
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"product": {
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"product_id": "libpython3_5m1_0-32bit-3.5.1-3.6.s390x"
}
},
{
"category": "product_version",
"name": "python3-base-3.5.1-3.6.s390x",
"product": {
"name": "python3-base-3.5.1-3.6.s390x",
"product_id": "python3-base-3.5.1-3.6.s390x"
}
},
{
"category": "product_version",
"name": "python3-base-32bit-3.5.1-3.6.s390x",
"product": {
"name": "python3-base-32bit-3.5.1-3.6.s390x",
"product_id": "python3-base-32bit-3.5.1-3.6.s390x"
}
},
{
"category": "product_version",
"name": "python3-devel-3.5.1-3.6.s390x",
"product": {
"name": "python3-devel-3.5.1-3.6.s390x",
"product_id": "python3-devel-3.5.1-3.6.s390x"
}
},
{
"category": "product_version",
"name": "python3-idle-3.5.1-3.6.s390x",
"product": {
"name": "python3-idle-3.5.1-3.6.s390x",
"product_id": "python3-idle-3.5.1-3.6.s390x"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.5.1-3.6.s390x",
"product": {
"name": "python3-testsuite-3.5.1-3.6.s390x",
"product_id": "python3-testsuite-3.5.1-3.6.s390x"
}
},
{
"category": "product_version",
"name": "python3-tools-3.5.1-3.6.s390x",
"product": {
"name": "python3-tools-3.5.1-3.6.s390x",
"product_id": "python3-tools-3.5.1-3.6.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_5m1_0-3.5.1-3.6.x86_64",
"product": {
"name": "libpython3_5m1_0-3.5.1-3.6.x86_64",
"product_id": "libpython3_5m1_0-3.5.1-3.6.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"product": {
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"product_id": "libpython3_5m1_0-32bit-3.5.1-3.6.x86_64"
}
},
{
"category": "product_version",
"name": "python3-base-3.5.1-3.6.x86_64",
"product": {
"name": "python3-base-3.5.1-3.6.x86_64",
"product_id": "python3-base-3.5.1-3.6.x86_64"
}
},
{
"category": "product_version",
"name": "python3-base-32bit-3.5.1-3.6.x86_64",
"product": {
"name": "python3-base-32bit-3.5.1-3.6.x86_64",
"product_id": "python3-base-32bit-3.5.1-3.6.x86_64"
}
},
{
"category": "product_version",
"name": "python3-devel-3.5.1-3.6.x86_64",
"product": {
"name": "python3-devel-3.5.1-3.6.x86_64",
"product_id": "python3-devel-3.5.1-3.6.x86_64"
}
},
{
"category": "product_version",
"name": "python3-idle-3.5.1-3.6.x86_64",
"product": {
"name": "python3-idle-3.5.1-3.6.x86_64",
"product_id": "python3-idle-3.5.1-3.6.x86_64"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.5.1-3.6.x86_64",
"product": {
"name": "python3-testsuite-3.5.1-3.6.x86_64",
"product_id": "python3-testsuite-3.5.1-3.6.x86_64"
}
},
{
"category": "product_version",
"name": "python3-tools-3.5.1-3.6.x86_64",
"product": {
"name": "python3-tools-3.5.1-3.6.x86_64",
"product_id": "python3-tools-3.5.1-3.6.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_5m1_0-3.5.1-3.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64"
},
"product_reference": "libpython3_5m1_0-3.5.1-3.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_5m1_0-3.5.1-3.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le"
},
"product_reference": "libpython3_5m1_0-3.5.1-3.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_5m1_0-3.5.1-3.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x"
},
"product_reference": "libpython3_5m1_0-3.5.1-3.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_5m1_0-3.5.1-3.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64"
},
"product_reference": "libpython3_5m1_0-3.5.1-3.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64"
},
"product_reference": "libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le"
},
"product_reference": "libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x"
},
"product_reference": "libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_5m1_0-32bit-3.5.1-3.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64"
},
"product_reference": "libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.5.1-3.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64"
},
"product_reference": "python3-base-3.5.1-3.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.5.1-3.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le"
},
"product_reference": "python3-base-3.5.1-3.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.5.1-3.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x"
},
"product_reference": "python3-base-3.5.1-3.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.5.1-3.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64"
},
"product_reference": "python3-base-3.5.1-3.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-32bit-3.5.1-3.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64"
},
"product_reference": "python3-base-32bit-3.5.1-3.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-32bit-3.5.1-3.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le"
},
"product_reference": "python3-base-32bit-3.5.1-3.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-32bit-3.5.1-3.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x"
},
"product_reference": "python3-base-32bit-3.5.1-3.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-32bit-3.5.1-3.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64"
},
"product_reference": "python3-base-32bit-3.5.1-3.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.5.1-3.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64"
},
"product_reference": "python3-devel-3.5.1-3.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.5.1-3.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le"
},
"product_reference": "python3-devel-3.5.1-3.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.5.1-3.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x"
},
"product_reference": "python3-devel-3.5.1-3.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.5.1-3.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64"
},
"product_reference": "python3-devel-3.5.1-3.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.5.1-3.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64"
},
"product_reference": "python3-idle-3.5.1-3.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.5.1-3.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le"
},
"product_reference": "python3-idle-3.5.1-3.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.5.1-3.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x"
},
"product_reference": "python3-idle-3.5.1-3.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.5.1-3.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64"
},
"product_reference": "python3-idle-3.5.1-3.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.5.1-3.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64"
},
"product_reference": "python3-testsuite-3.5.1-3.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.5.1-3.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le"
},
"product_reference": "python3-testsuite-3.5.1-3.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.5.1-3.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x"
},
"product_reference": "python3-testsuite-3.5.1-3.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.5.1-3.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64"
},
"product_reference": "python3-testsuite-3.5.1-3.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.5.1-3.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64"
},
"product_reference": "python3-tools-3.5.1-3.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.5.1-3.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le"
},
"product_reference": "python3-tools-3.5.1-3.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.5.1-3.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x"
},
"product_reference": "python3-tools-3.5.1-3.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.5.1-3.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
},
"product_reference": "python3-tools-3.5.1-3.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:libpython3_5m1_0-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-base-32bit-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-devel-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-idle-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-testsuite-3.5.1-3.6.x86_64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.aarch64",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.ppc64le",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.s390x",
"openSUSE Tumbleweed:python3-tools-3.5.1-3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
}
]
}
opensuse-su-2024:10451-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libfreebl3-3.26.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libfreebl3-3.26.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10451",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10451-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3170 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-0743 page",
"url": "https://www.suse.com/security/cve/CVE-2013-0743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-0791 page",
"url": "https://www.suse.com/security/cve/CVE-2013-0791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1620 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1739 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1740 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-5605 page",
"url": "https://www.suse.com/security/cve/CVE-2013-5605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-1490 page",
"url": "https://www.suse.com/security/cve/CVE-2014-1490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-1491 page",
"url": "https://www.suse.com/security/cve/CVE-2014-1491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-1492 page",
"url": "https://www.suse.com/security/cve/CVE-2014-1492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-1568 page",
"url": "https://www.suse.com/security/cve/CVE-2014-1568/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-1569 page",
"url": "https://www.suse.com/security/cve/CVE-2014-1569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2721 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-4000 page",
"url": "https://www.suse.com/security/cve/CVE-2015-4000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7181 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7182 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7575 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7575/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1950 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1979 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1979/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2834 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2834/"
}
],
"title": "libfreebl3-3.26.2-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10451-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libfreebl3-3.26.2-1.1.aarch64",
"product": {
"name": "libfreebl3-3.26.2-1.1.aarch64",
"product_id": "libfreebl3-3.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfreebl3-32bit-3.26.2-1.1.aarch64",
"product": {
"name": "libfreebl3-32bit-3.26.2-1.1.aarch64",
"product_id": "libfreebl3-32bit-3.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-3.26.2-1.1.aarch64",
"product": {
"name": "libsoftokn3-3.26.2-1.1.aarch64",
"product_id": "libsoftokn3-3.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-32bit-3.26.2-1.1.aarch64",
"product": {
"name": "libsoftokn3-32bit-3.26.2-1.1.aarch64",
"product_id": "libsoftokn3-32bit-3.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-3.26.2-1.1.aarch64",
"product": {
"name": "mozilla-nss-3.26.2-1.1.aarch64",
"product_id": "mozilla-nss-3.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-32bit-3.26.2-1.1.aarch64",
"product": {
"name": "mozilla-nss-32bit-3.26.2-1.1.aarch64",
"product_id": "mozilla-nss-32bit-3.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-3.26.2-1.1.aarch64",
"product": {
"name": "mozilla-nss-certs-3.26.2-1.1.aarch64",
"product_id": "mozilla-nss-certs-3.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"product": {
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"product_id": "mozilla-nss-certs-32bit-3.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-devel-3.26.2-1.1.aarch64",
"product": {
"name": "mozilla-nss-devel-3.26.2-1.1.aarch64",
"product_id": "mozilla-nss-devel-3.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"product": {
"name": "mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"product_id": "mozilla-nss-sysinit-3.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"product": {
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"product_id": "mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-tools-3.26.2-1.1.aarch64",
"product": {
"name": "mozilla-nss-tools-3.26.2-1.1.aarch64",
"product_id": "mozilla-nss-tools-3.26.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libfreebl3-3.26.2-1.1.ppc64le",
"product": {
"name": "libfreebl3-3.26.2-1.1.ppc64le",
"product_id": "libfreebl3-3.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfreebl3-32bit-3.26.2-1.1.ppc64le",
"product": {
"name": "libfreebl3-32bit-3.26.2-1.1.ppc64le",
"product_id": "libfreebl3-32bit-3.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoftokn3-3.26.2-1.1.ppc64le",
"product": {
"name": "libsoftokn3-3.26.2-1.1.ppc64le",
"product_id": "libsoftokn3-3.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"product": {
"name": "libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"product_id": "libsoftokn3-32bit-3.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-3.26.2-1.1.ppc64le",
"product": {
"name": "mozilla-nss-3.26.2-1.1.ppc64le",
"product_id": "mozilla-nss-3.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"product": {
"name": "mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"product_id": "mozilla-nss-32bit-3.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-3.26.2-1.1.ppc64le",
"product": {
"name": "mozilla-nss-certs-3.26.2-1.1.ppc64le",
"product_id": "mozilla-nss-certs-3.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"product": {
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"product_id": "mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-devel-3.26.2-1.1.ppc64le",
"product": {
"name": "mozilla-nss-devel-3.26.2-1.1.ppc64le",
"product_id": "mozilla-nss-devel-3.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"product": {
"name": "mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"product_id": "mozilla-nss-sysinit-3.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"product": {
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"product_id": "mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-tools-3.26.2-1.1.ppc64le",
"product": {
"name": "mozilla-nss-tools-3.26.2-1.1.ppc64le",
"product_id": "mozilla-nss-tools-3.26.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libfreebl3-3.26.2-1.1.s390x",
"product": {
"name": "libfreebl3-3.26.2-1.1.s390x",
"product_id": "libfreebl3-3.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libfreebl3-32bit-3.26.2-1.1.s390x",
"product": {
"name": "libfreebl3-32bit-3.26.2-1.1.s390x",
"product_id": "libfreebl3-32bit-3.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsoftokn3-3.26.2-1.1.s390x",
"product": {
"name": "libsoftokn3-3.26.2-1.1.s390x",
"product_id": "libsoftokn3-3.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsoftokn3-32bit-3.26.2-1.1.s390x",
"product": {
"name": "libsoftokn3-32bit-3.26.2-1.1.s390x",
"product_id": "libsoftokn3-32bit-3.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-3.26.2-1.1.s390x",
"product": {
"name": "mozilla-nss-3.26.2-1.1.s390x",
"product_id": "mozilla-nss-3.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-32bit-3.26.2-1.1.s390x",
"product": {
"name": "mozilla-nss-32bit-3.26.2-1.1.s390x",
"product_id": "mozilla-nss-32bit-3.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-3.26.2-1.1.s390x",
"product": {
"name": "mozilla-nss-certs-3.26.2-1.1.s390x",
"product_id": "mozilla-nss-certs-3.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"product": {
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"product_id": "mozilla-nss-certs-32bit-3.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-devel-3.26.2-1.1.s390x",
"product": {
"name": "mozilla-nss-devel-3.26.2-1.1.s390x",
"product_id": "mozilla-nss-devel-3.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-3.26.2-1.1.s390x",
"product": {
"name": "mozilla-nss-sysinit-3.26.2-1.1.s390x",
"product_id": "mozilla-nss-sysinit-3.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"product": {
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"product_id": "mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-tools-3.26.2-1.1.s390x",
"product": {
"name": "mozilla-nss-tools-3.26.2-1.1.s390x",
"product_id": "mozilla-nss-tools-3.26.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libfreebl3-3.26.2-1.1.x86_64",
"product": {
"name": "libfreebl3-3.26.2-1.1.x86_64",
"product_id": "libfreebl3-3.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfreebl3-32bit-3.26.2-1.1.x86_64",
"product": {
"name": "libfreebl3-32bit-3.26.2-1.1.x86_64",
"product_id": "libfreebl3-32bit-3.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-3.26.2-1.1.x86_64",
"product": {
"name": "libsoftokn3-3.26.2-1.1.x86_64",
"product_id": "libsoftokn3-3.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-32bit-3.26.2-1.1.x86_64",
"product": {
"name": "libsoftokn3-32bit-3.26.2-1.1.x86_64",
"product_id": "libsoftokn3-32bit-3.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-3.26.2-1.1.x86_64",
"product": {
"name": "mozilla-nss-3.26.2-1.1.x86_64",
"product_id": "mozilla-nss-3.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-32bit-3.26.2-1.1.x86_64",
"product": {
"name": "mozilla-nss-32bit-3.26.2-1.1.x86_64",
"product_id": "mozilla-nss-32bit-3.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-3.26.2-1.1.x86_64",
"product": {
"name": "mozilla-nss-certs-3.26.2-1.1.x86_64",
"product_id": "mozilla-nss-certs-3.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"product": {
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"product_id": "mozilla-nss-certs-32bit-3.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-devel-3.26.2-1.1.x86_64",
"product": {
"name": "mozilla-nss-devel-3.26.2-1.1.x86_64",
"product_id": "mozilla-nss-devel-3.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"product": {
"name": "mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"product_id": "mozilla-nss-sysinit-3.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"product": {
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"product_id": "mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-tools-3.26.2-1.1.x86_64",
"product": {
"name": "mozilla-nss-tools-3.26.2-1.1.x86_64",
"product_id": "mozilla-nss-tools-3.26.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64"
},
"product_reference": "libfreebl3-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le"
},
"product_reference": "libfreebl3-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x"
},
"product_reference": "libfreebl3-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64"
},
"product_reference": "libfreebl3-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-32bit-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64"
},
"product_reference": "libfreebl3-32bit-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-32bit-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le"
},
"product_reference": "libfreebl3-32bit-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-32bit-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x"
},
"product_reference": "libfreebl3-32bit-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-32bit-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64"
},
"product_reference": "libfreebl3-32bit-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64"
},
"product_reference": "libsoftokn3-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le"
},
"product_reference": "libsoftokn3-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x"
},
"product_reference": "libsoftokn3-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64"
},
"product_reference": "libsoftokn3-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-32bit-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64"
},
"product_reference": "libsoftokn3-32bit-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-32bit-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le"
},
"product_reference": "libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-32bit-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x"
},
"product_reference": "libsoftokn3-32bit-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-32bit-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64"
},
"product_reference": "libsoftokn3-32bit-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64"
},
"product_reference": "mozilla-nss-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le"
},
"product_reference": "mozilla-nss-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x"
},
"product_reference": "mozilla-nss-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64"
},
"product_reference": "mozilla-nss-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-32bit-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64"
},
"product_reference": "mozilla-nss-32bit-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-32bit-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le"
},
"product_reference": "mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-32bit-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x"
},
"product_reference": "mozilla-nss-32bit-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-32bit-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64"
},
"product_reference": "mozilla-nss-32bit-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64"
},
"product_reference": "mozilla-nss-certs-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le"
},
"product_reference": "mozilla-nss-certs-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x"
},
"product_reference": "mozilla-nss-certs-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64"
},
"product_reference": "mozilla-nss-certs-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64"
},
"product_reference": "mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le"
},
"product_reference": "mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x"
},
"product_reference": "mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-32bit-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64"
},
"product_reference": "mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-devel-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64"
},
"product_reference": "mozilla-nss-devel-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-devel-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le"
},
"product_reference": "mozilla-nss-devel-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-devel-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x"
},
"product_reference": "mozilla-nss-devel-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-devel-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64"
},
"product_reference": "mozilla-nss-devel-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64"
},
"product_reference": "mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le"
},
"product_reference": "mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x"
},
"product_reference": "mozilla-nss-sysinit-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64"
},
"product_reference": "mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64"
},
"product_reference": "mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le"
},
"product_reference": "mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x"
},
"product_reference": "mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64"
},
"product_reference": "mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-tools-3.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64"
},
"product_reference": "mozilla-nss-tools-3.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-tools-3.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le"
},
"product_reference": "mozilla-nss-tools-3.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-tools-3.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x"
},
"product_reference": "mozilla-nss-tools-3.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-tools-3.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
},
"product_reference": "mozilla-nss-tools-3.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-3170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3170"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject\u0027s Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3170",
"url": "https://www.suse.com/security/cve/CVE-2010-3170"
},
{
"category": "external",
"summary": "SUSE Bug 637290 for CVE-2010-3170",
"url": "https://bugzilla.suse.com/637290"
},
{
"category": "external",
"summary": "SUSE Bug 645315 for CVE-2010-3170",
"url": "https://bugzilla.suse.com/645315"
},
{
"category": "external",
"summary": "SUSE Bug 652858 for CVE-2010-3170",
"url": "https://bugzilla.suse.com/652858"
},
{
"category": "external",
"summary": "SUSE Bug 868629 for CVE-2010-3170",
"url": "https://bugzilla.suse.com/868629"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3170"
},
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3640"
}
],
"notes": [
{
"category": "general",
"text": "Untrusted search path vulnerability in Mozilla Network Security Services (NSS), as used in Google Chrome before 17 on Windows and Mac OS X, might allow local users to gain privileges via a Trojan horse pkcs11.txt file in a top-level directory. NOTE: the vendor\u0027s response was \"Strange behavior, but we\u0027re not treating this as a security bug.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3640",
"url": "https://www.suse.com/security/cve/CVE-2011-3640"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3640",
"url": "https://bugzilla.suse.com/726096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-3640"
},
{
"cve": "CVE-2013-0743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-0743"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA at the suggestion of the CVE project team. The candidate had been associated with a correct report of a security problem, but not a problem that is categorized as a vulnerability within CVE. Compromised or unauthorized SSL certificates are not within CVE\u0027s scope. Notes: none",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-0743",
"url": "https://www.suse.com/security/cve/CVE-2013-0743"
},
{
"category": "external",
"summary": "SUSE Bug 796895 for CVE-2013-0743",
"url": "https://bugzilla.suse.com/796895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-0743"
},
{
"cve": "CVE-2013-0791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-0791"
}
],
"notes": [
{
"category": "general",
"text": "The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-0791",
"url": "https://www.suse.com/security/cve/CVE-2013-0791"
},
{
"category": "external",
"summary": "SUSE Bug 813026 for CVE-2013-0791",
"url": "https://bugzilla.suse.com/813026"
},
{
"category": "external",
"summary": "SUSE Bug 819204 for CVE-2013-0791",
"url": "https://bugzilla.suse.com/819204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-0791"
},
{
"cve": "CVE-2013-1620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1620"
}
],
"notes": [
{
"category": "general",
"text": "The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1620",
"url": "https://www.suse.com/security/cve/CVE-2013-1620"
},
{
"category": "external",
"summary": "SUSE Bug 802184 for CVE-2013-1620",
"url": "https://bugzilla.suse.com/802184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1620"
},
{
"cve": "CVE-2013-1739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1739"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1739",
"url": "https://www.suse.com/security/cve/CVE-2013-1739"
},
{
"category": "external",
"summary": "SUSE Bug 842979 for CVE-2013-1739",
"url": "https://bugzilla.suse.com/842979"
},
{
"category": "external",
"summary": "SUSE Bug 847708 for CVE-2013-1739",
"url": "https://bugzilla.suse.com/847708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1739"
},
{
"cve": "CVE-2013-1740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1740"
}
],
"notes": [
{
"category": "general",
"text": "The ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1740",
"url": "https://www.suse.com/security/cve/CVE-2013-1740"
},
{
"category": "external",
"summary": "SUSE Bug 859055 for CVE-2013-1740",
"url": "https://bugzilla.suse.com/859055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1740"
},
{
"cve": "CVE-2013-5605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-5605"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-5605",
"url": "https://www.suse.com/security/cve/CVE-2013-5605"
},
{
"category": "external",
"summary": "SUSE Bug 850148 for CVE-2013-5605",
"url": "https://bugzilla.suse.com/850148"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2013-5605"
},
{
"cve": "CVE-2014-1490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-1490"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-1490",
"url": "https://www.suse.com/security/cve/CVE-2014-1490"
},
{
"category": "external",
"summary": "SUSE Bug 861847 for CVE-2014-1490",
"url": "https://bugzilla.suse.com/861847"
},
{
"category": "external",
"summary": "SUSE Bug 862300 for CVE-2014-1490",
"url": "https://bugzilla.suse.com/862300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-1490"
},
{
"cve": "CVE-2014-1491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-1491"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-1491",
"url": "https://www.suse.com/security/cve/CVE-2014-1491"
},
{
"category": "external",
"summary": "SUSE Bug 861847 for CVE-2014-1491",
"url": "https://bugzilla.suse.com/861847"
},
{
"category": "external",
"summary": "SUSE Bug 862289 for CVE-2014-1491",
"url": "https://bugzilla.suse.com/862289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-1491"
},
{
"cve": "CVE-2014-1492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-1492"
}
],
"notes": [
{
"category": "general",
"text": "The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name\u0027s U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-1492",
"url": "https://www.suse.com/security/cve/CVE-2014-1492"
},
{
"category": "external",
"summary": "SUSE Bug 869827 for CVE-2014-1492",
"url": "https://bugzilla.suse.com/869827"
},
{
"category": "external",
"summary": "SUSE Bug 926974 for CVE-2014-1492",
"url": "https://bugzilla.suse.com/926974"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-1492"
},
{
"cve": "CVE-2014-1568",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-1568"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a \"signature malleability\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-1568",
"url": "https://www.suse.com/security/cve/CVE-2014-1568"
},
{
"category": "external",
"summary": "SUSE Bug 1107874 for CVE-2014-1568",
"url": "https://bugzilla.suse.com/1107874"
},
{
"category": "external",
"summary": "SUSE Bug 897890 for CVE-2014-1568",
"url": "https://bugzilla.suse.com/897890"
},
{
"category": "external",
"summary": "SUSE Bug 898959 for CVE-2014-1568",
"url": "https://bugzilla.suse.com/898959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-1568"
},
{
"cve": "CVE-2014-1569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-1569"
}
],
"notes": [
{
"category": "general",
"text": "The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function\u0027s improper handling of an arbitrary-length encoding of 0x00.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-1569",
"url": "https://www.suse.com/security/cve/CVE-2014-1569"
},
{
"category": "external",
"summary": "SUSE Bug 910647 for CVE-2014-1569",
"url": "https://bugzilla.suse.com/910647"
},
{
"category": "external",
"summary": "SUSE Bug 913096 for CVE-2014-1569",
"url": "https://bugzilla.suse.com/913096"
},
{
"category": "external",
"summary": "SUSE Bug 917597 for CVE-2014-1569",
"url": "https://bugzilla.suse.com/917597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-1569"
},
{
"cve": "CVE-2015-2721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2721"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a \"SMACK SKIP-TLS\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2721",
"url": "https://www.suse.com/security/cve/CVE-2015-2721"
},
{
"category": "external",
"summary": "SUSE Bug 863095 for CVE-2015-2721",
"url": "https://bugzilla.suse.com/863095"
},
{
"category": "external",
"summary": "SUSE Bug 935979 for CVE-2015-2721",
"url": "https://bugzilla.suse.com/935979"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-2721"
},
{
"cve": "CVE-2015-4000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-4000"
}
],
"notes": [
{
"category": "general",
"text": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-4000",
"url": "https://www.suse.com/security/cve/CVE-2015-4000"
},
{
"category": "external",
"summary": "SUSE Bug 1074631 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/1074631"
},
{
"category": "external",
"summary": "SUSE Bug 1211968 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/1211968"
},
{
"category": "external",
"summary": "SUSE Bug 931600 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/931600"
},
{
"category": "external",
"summary": "SUSE Bug 931698 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/931698"
},
{
"category": "external",
"summary": "SUSE Bug 931723 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/931723"
},
{
"category": "external",
"summary": "SUSE Bug 931845 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/931845"
},
{
"category": "external",
"summary": "SUSE Bug 932026 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/932026"
},
{
"category": "external",
"summary": "SUSE Bug 932483 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/932483"
},
{
"category": "external",
"summary": "SUSE Bug 934789 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/934789"
},
{
"category": "external",
"summary": "SUSE Bug 935033 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/935033"
},
{
"category": "external",
"summary": "SUSE Bug 935540 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/935540"
},
{
"category": "external",
"summary": "SUSE Bug 935979 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/935979"
},
{
"category": "external",
"summary": "SUSE Bug 937202 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/937202"
},
{
"category": "external",
"summary": "SUSE Bug 937766 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/937766"
},
{
"category": "external",
"summary": "SUSE Bug 938248 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938248"
},
{
"category": "external",
"summary": "SUSE Bug 938432 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938432"
},
{
"category": "external",
"summary": "SUSE Bug 938895 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938895"
},
{
"category": "external",
"summary": "SUSE Bug 938905 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938905"
},
{
"category": "external",
"summary": "SUSE Bug 938906 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938906"
},
{
"category": "external",
"summary": "SUSE Bug 938913 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938913"
},
{
"category": "external",
"summary": "SUSE Bug 938945 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938945"
},
{
"category": "external",
"summary": "SUSE Bug 943664 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/943664"
},
{
"category": "external",
"summary": "SUSE Bug 944729 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/944729"
},
{
"category": "external",
"summary": "SUSE Bug 945582 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/945582"
},
{
"category": "external",
"summary": "SUSE Bug 955589 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/955589"
},
{
"category": "external",
"summary": "SUSE Bug 980406 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/980406"
},
{
"category": "external",
"summary": "SUSE Bug 990592 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/990592"
},
{
"category": "external",
"summary": "SUSE Bug 994144 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/994144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-4000"
},
{
"cve": "CVE-2015-7181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7181"
}
],
"notes": [
{
"category": "general",
"text": "The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a \"use-after-poison\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7181",
"url": "https://www.suse.com/security/cve/CVE-2015-7181"
},
{
"category": "external",
"summary": "SUSE Bug 952810 for CVE-2015-7181",
"url": "https://bugzilla.suse.com/952810"
},
{
"category": "external",
"summary": "SUSE Bug 962977 for CVE-2015-7181",
"url": "https://bugzilla.suse.com/962977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2015-7181"
},
{
"cve": "CVE-2015-7182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7182"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7182",
"url": "https://www.suse.com/security/cve/CVE-2015-7182"
},
{
"category": "external",
"summary": "SUSE Bug 952810 for CVE-2015-7182",
"url": "https://bugzilla.suse.com/952810"
},
{
"category": "external",
"summary": "SUSE Bug 962977 for CVE-2015-7182",
"url": "https://bugzilla.suse.com/962977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2015-7182"
},
{
"cve": "CVE-2015-7575",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7575"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7575",
"url": "https://www.suse.com/security/cve/CVE-2015-7575"
},
{
"category": "external",
"summary": "SUSE Bug 959888 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/959888"
},
{
"category": "external",
"summary": "SUSE Bug 960402 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/960402"
},
{
"category": "external",
"summary": "SUSE Bug 960996 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/960996"
},
{
"category": "external",
"summary": "SUSE Bug 961280 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/961280"
},
{
"category": "external",
"summary": "SUSE Bug 961281 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/961281"
},
{
"category": "external",
"summary": "SUSE Bug 961282 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/961282"
},
{
"category": "external",
"summary": "SUSE Bug 961283 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/961283"
},
{
"category": "external",
"summary": "SUSE Bug 961284 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/961284"
},
{
"category": "external",
"summary": "SUSE Bug 961290 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/961290"
},
{
"category": "external",
"summary": "SUSE Bug 961357 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/961357"
},
{
"category": "external",
"summary": "SUSE Bug 962743 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/962743"
},
{
"category": "external",
"summary": "SUSE Bug 963937 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/963937"
},
{
"category": "external",
"summary": "SUSE Bug 967521 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/967521"
},
{
"category": "external",
"summary": "SUSE Bug 981087 for CVE-2015-7575",
"url": "https://bugzilla.suse.com/981087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-7575"
},
{
"cve": "CVE-2016-1950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1950"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1950",
"url": "https://www.suse.com/security/cve/CVE-2016-1950"
},
{
"category": "external",
"summary": "SUSE Bug 969894 for CVE-2016-1950",
"url": "https://bugzilla.suse.com/969894"
},
{
"category": "external",
"summary": "SUSE Bug 970257 for CVE-2016-1950",
"url": "https://bugzilla.suse.com/970257"
},
{
"category": "external",
"summary": "SUSE Bug 970377 for CVE-2016-1950",
"url": "https://bugzilla.suse.com/970377"
},
{
"category": "external",
"summary": "SUSE Bug 970378 for CVE-2016-1950",
"url": "https://bugzilla.suse.com/970378"
},
{
"category": "external",
"summary": "SUSE Bug 970379 for CVE-2016-1950",
"url": "https://bugzilla.suse.com/970379"
},
{
"category": "external",
"summary": "SUSE Bug 970380 for CVE-2016-1950",
"url": "https://bugzilla.suse.com/970380"
},
{
"category": "external",
"summary": "SUSE Bug 970381 for CVE-2016-1950",
"url": "https://bugzilla.suse.com/970381"
},
{
"category": "external",
"summary": "SUSE Bug 970431 for CVE-2016-1950",
"url": "https://bugzilla.suse.com/970431"
},
{
"category": "external",
"summary": "SUSE Bug 970433 for CVE-2016-1950",
"url": "https://bugzilla.suse.com/970433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-1950"
},
{
"cve": "CVE-2016-1979",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1979"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1979",
"url": "https://www.suse.com/security/cve/CVE-2016-1979"
},
{
"category": "external",
"summary": "SUSE Bug 969894 for CVE-2016-1979",
"url": "https://bugzilla.suse.com/969894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-1979"
},
{
"cve": "CVE-2016-2834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2834"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2834",
"url": "https://www.suse.com/security/cve/CVE-2016-2834"
},
{
"category": "external",
"summary": "SUSE Bug 983549 for CVE-2016-2834",
"url": "https://bugzilla.suse.com/983549"
},
{
"category": "external",
"summary": "SUSE Bug 983639 for CVE-2016-2834",
"url": "https://bugzilla.suse.com/983639"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-2834"
}
]
}
opensuse-su-2024:11202-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python-2.7.18-8.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python-2.7.18-8.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11202",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11202-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-2052 page",
"url": "https://www.suse.com/security/cve/CVE-2007-2052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-1721 page",
"url": "https://www.suse.com/security/cve/CVE-2008-1721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-2315 page",
"url": "https://www.suse.com/security/cve/CVE-2008-2315/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-2316 page",
"url": "https://www.suse.com/security/cve/CVE-2008-2316/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-3142 page",
"url": "https://www.suse.com/security/cve/CVE-2008-3142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-3143 page",
"url": "https://www.suse.com/security/cve/CVE-2008-3143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-3144 page",
"url": "https://www.suse.com/security/cve/CVE-2008-3144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-1521 page",
"url": "https://www.suse.com/security/cve/CVE-2011-1521/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1753 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-1912 page",
"url": "https://www.suse.com/security/cve/CVE-2014-1912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7185 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000110 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000158 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18207 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000030 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000802 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000802/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1060 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1061 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14647 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20852 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10160 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16935 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16935/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18348 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9636 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9674 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9948 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8492 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23336 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3733 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3737 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3737/"
}
],
"title": "python-2.7.18-8.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11202-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-2.7.18-8.1.aarch64",
"product": {
"name": "python-2.7.18-8.1.aarch64",
"product_id": "python-2.7.18-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "python-32bit-2.7.18-8.1.aarch64",
"product": {
"name": "python-32bit-2.7.18-8.1.aarch64",
"product_id": "python-32bit-2.7.18-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "python-curses-2.7.18-8.1.aarch64",
"product": {
"name": "python-curses-2.7.18-8.1.aarch64",
"product_id": "python-curses-2.7.18-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "python-demo-2.7.18-8.1.aarch64",
"product": {
"name": "python-demo-2.7.18-8.1.aarch64",
"product_id": "python-demo-2.7.18-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "python-gdbm-2.7.18-8.1.aarch64",
"product": {
"name": "python-gdbm-2.7.18-8.1.aarch64",
"product_id": "python-gdbm-2.7.18-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "python-idle-2.7.18-8.1.aarch64",
"product": {
"name": "python-idle-2.7.18-8.1.aarch64",
"product_id": "python-idle-2.7.18-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "python-tk-2.7.18-8.1.aarch64",
"product": {
"name": "python-tk-2.7.18-8.1.aarch64",
"product_id": "python-tk-2.7.18-8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-2.7.18-8.1.ppc64le",
"product": {
"name": "python-2.7.18-8.1.ppc64le",
"product_id": "python-2.7.18-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python-32bit-2.7.18-8.1.ppc64le",
"product": {
"name": "python-32bit-2.7.18-8.1.ppc64le",
"product_id": "python-32bit-2.7.18-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python-curses-2.7.18-8.1.ppc64le",
"product": {
"name": "python-curses-2.7.18-8.1.ppc64le",
"product_id": "python-curses-2.7.18-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python-demo-2.7.18-8.1.ppc64le",
"product": {
"name": "python-demo-2.7.18-8.1.ppc64le",
"product_id": "python-demo-2.7.18-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python-gdbm-2.7.18-8.1.ppc64le",
"product": {
"name": "python-gdbm-2.7.18-8.1.ppc64le",
"product_id": "python-gdbm-2.7.18-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python-idle-2.7.18-8.1.ppc64le",
"product": {
"name": "python-idle-2.7.18-8.1.ppc64le",
"product_id": "python-idle-2.7.18-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python-tk-2.7.18-8.1.ppc64le",
"product": {
"name": "python-tk-2.7.18-8.1.ppc64le",
"product_id": "python-tk-2.7.18-8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-2.7.18-8.1.s390x",
"product": {
"name": "python-2.7.18-8.1.s390x",
"product_id": "python-2.7.18-8.1.s390x"
}
},
{
"category": "product_version",
"name": "python-32bit-2.7.18-8.1.s390x",
"product": {
"name": "python-32bit-2.7.18-8.1.s390x",
"product_id": "python-32bit-2.7.18-8.1.s390x"
}
},
{
"category": "product_version",
"name": "python-curses-2.7.18-8.1.s390x",
"product": {
"name": "python-curses-2.7.18-8.1.s390x",
"product_id": "python-curses-2.7.18-8.1.s390x"
}
},
{
"category": "product_version",
"name": "python-demo-2.7.18-8.1.s390x",
"product": {
"name": "python-demo-2.7.18-8.1.s390x",
"product_id": "python-demo-2.7.18-8.1.s390x"
}
},
{
"category": "product_version",
"name": "python-gdbm-2.7.18-8.1.s390x",
"product": {
"name": "python-gdbm-2.7.18-8.1.s390x",
"product_id": "python-gdbm-2.7.18-8.1.s390x"
}
},
{
"category": "product_version",
"name": "python-idle-2.7.18-8.1.s390x",
"product": {
"name": "python-idle-2.7.18-8.1.s390x",
"product_id": "python-idle-2.7.18-8.1.s390x"
}
},
{
"category": "product_version",
"name": "python-tk-2.7.18-8.1.s390x",
"product": {
"name": "python-tk-2.7.18-8.1.s390x",
"product_id": "python-tk-2.7.18-8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-2.7.18-8.1.x86_64",
"product": {
"name": "python-2.7.18-8.1.x86_64",
"product_id": "python-2.7.18-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "python-32bit-2.7.18-8.1.x86_64",
"product": {
"name": "python-32bit-2.7.18-8.1.x86_64",
"product_id": "python-32bit-2.7.18-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "python-curses-2.7.18-8.1.x86_64",
"product": {
"name": "python-curses-2.7.18-8.1.x86_64",
"product_id": "python-curses-2.7.18-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "python-demo-2.7.18-8.1.x86_64",
"product": {
"name": "python-demo-2.7.18-8.1.x86_64",
"product_id": "python-demo-2.7.18-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "python-gdbm-2.7.18-8.1.x86_64",
"product": {
"name": "python-gdbm-2.7.18-8.1.x86_64",
"product_id": "python-gdbm-2.7.18-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "python-idle-2.7.18-8.1.x86_64",
"product": {
"name": "python-idle-2.7.18-8.1.x86_64",
"product_id": "python-idle-2.7.18-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "python-tk-2.7.18-8.1.x86_64",
"product": {
"name": "python-tk-2.7.18-8.1.x86_64",
"product_id": "python-tk-2.7.18-8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64"
},
"product_reference": "python-2.7.18-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le"
},
"product_reference": "python-2.7.18-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.18-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-2.7.18-8.1.s390x"
},
"product_reference": "python-2.7.18-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64"
},
"product_reference": "python-2.7.18-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-32bit-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64"
},
"product_reference": "python-32bit-2.7.18-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-32bit-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le"
},
"product_reference": "python-32bit-2.7.18-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-32bit-2.7.18-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x"
},
"product_reference": "python-32bit-2.7.18-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-32bit-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64"
},
"product_reference": "python-32bit-2.7.18-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64"
},
"product_reference": "python-curses-2.7.18-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le"
},
"product_reference": "python-curses-2.7.18-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.18-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x"
},
"product_reference": "python-curses-2.7.18-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64"
},
"product_reference": "python-curses-2.7.18-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-demo-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64"
},
"product_reference": "python-demo-2.7.18-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-demo-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le"
},
"product_reference": "python-demo-2.7.18-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-demo-2.7.18-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x"
},
"product_reference": "python-demo-2.7.18-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-demo-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64"
},
"product_reference": "python-demo-2.7.18-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64"
},
"product_reference": "python-gdbm-2.7.18-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le"
},
"product_reference": "python-gdbm-2.7.18-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.18-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x"
},
"product_reference": "python-gdbm-2.7.18-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64"
},
"product_reference": "python-gdbm-2.7.18-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idle-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64"
},
"product_reference": "python-idle-2.7.18-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idle-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le"
},
"product_reference": "python-idle-2.7.18-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idle-2.7.18-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x"
},
"product_reference": "python-idle-2.7.18-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idle-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64"
},
"product_reference": "python-idle-2.7.18-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64"
},
"product_reference": "python-tk-2.7.18-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le"
},
"product_reference": "python-tk-2.7.18-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.18-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x"
},
"product_reference": "python-tk-2.7.18-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
},
"product_reference": "python-tk-2.7.18-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-2052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-2052"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-2052",
"url": "https://www.suse.com/security/cve/CVE-2007-2052"
},
{
"category": "external",
"summary": "SUSE Bug 276889 for CVE-2007-2052",
"url": "https://bugzilla.suse.com/276889"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2007-2052"
},
{
"cve": "CVE-2008-1721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-1721"
}
],
"notes": [
{
"category": "general",
"text": "Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-1721",
"url": "https://www.suse.com/security/cve/CVE-2008-1721"
},
{
"category": "external",
"summary": "SUSE Bug 379044 for CVE-2008-1721",
"url": "https://bugzilla.suse.com/379044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2008-1721"
},
{
"cve": "CVE-2008-2315",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-2315"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-2315",
"url": "https://www.suse.com/security/cve/CVE-2008-2315"
},
{
"category": "external",
"summary": "SUSE Bug 406051 for CVE-2008-2315",
"url": "https://bugzilla.suse.com/406051"
},
{
"category": "external",
"summary": "SUSE Bug 443653 for CVE-2008-2315",
"url": "https://bugzilla.suse.com/443653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2008-2315"
},
{
"cve": "CVE-2008-2316",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-2316"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to \"partial hashlib hashing of data exceeding 4GB.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-2316",
"url": "https://www.suse.com/security/cve/CVE-2008-2316"
},
{
"category": "external",
"summary": "SUSE Bug 406051 for CVE-2008-2316",
"url": "https://bugzilla.suse.com/406051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2008-2316"
},
{
"cve": "CVE-2008-3142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-3142"
}
],
"notes": [
{
"category": "general",
"text": "Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-3142",
"url": "https://www.suse.com/security/cve/CVE-2008-3142"
},
{
"category": "external",
"summary": "SUSE Bug 406051 for CVE-2008-3142",
"url": "https://bugzilla.suse.com/406051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2008-3142"
},
{
"cve": "CVE-2008-3143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-3143"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by \"checks for integer overflows, contributed by Google.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-3143",
"url": "https://www.suse.com/security/cve/CVE-2008-3143"
},
{
"category": "external",
"summary": "SUSE Bug 406051 for CVE-2008-3143",
"url": "https://bugzilla.suse.com/406051"
},
{
"category": "external",
"summary": "SUSE Bug 444989 for CVE-2008-3143",
"url": "https://bugzilla.suse.com/444989"
},
{
"category": "external",
"summary": "SUSE Bug 609759 for CVE-2008-3143",
"url": "https://bugzilla.suse.com/609759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2008-3143"
},
{
"cve": "CVE-2008-3144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-3144"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-3144",
"url": "https://www.suse.com/security/cve/CVE-2008-3144"
},
{
"category": "external",
"summary": "SUSE Bug 406051 for CVE-2008-3144",
"url": "https://bugzilla.suse.com/406051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2008-3144"
},
{
"cve": "CVE-2011-1521",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-1521"
}
],
"notes": [
{
"category": "general",
"text": "The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-1521",
"url": "https://www.suse.com/security/cve/CVE-2011-1521"
},
{
"category": "external",
"summary": "SUSE Bug 682554 for CVE-2011-1521",
"url": "https://bugzilla.suse.com/682554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-1521"
},
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-1753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1753"
}
],
"notes": [
{
"category": "general",
"text": "The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1753",
"url": "https://www.suse.com/security/cve/CVE-2013-1753"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1753",
"url": "https://bugzilla.suse.com/856835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1753"
},
{
"cve": "CVE-2014-1912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-1912"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-1912",
"url": "https://www.suse.com/security/cve/CVE-2014-1912"
},
{
"category": "external",
"summary": "SUSE Bug 1049392 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/1049392"
},
{
"category": "external",
"summary": "SUSE Bug 1049422 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/1049422"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-1912"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2014-7185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7185"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a \"buffer\" function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7185",
"url": "https://www.suse.com/security/cve/CVE-2014-7185"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/912739"
},
{
"category": "external",
"summary": "SUSE Bug 913479 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/913479"
},
{
"category": "external",
"summary": "SUSE Bug 955182 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/955182"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-7185"
},
{
"cve": "CVE-2016-1000110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000110"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000110",
"url": "https://www.suse.com/security/cve/CVE-2016-1000110"
},
{
"category": "external",
"summary": "SUSE Bug 988484 for CVE-2016-1000110",
"url": "https://bugzilla.suse.com/988484"
},
{
"category": "external",
"summary": "SUSE Bug 989523 for CVE-2016-1000110",
"url": "https://bugzilla.suse.com/989523"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1000110"
},
{
"cve": "CVE-2017-1000158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000158"
}
],
"notes": [
{
"category": "general",
"text": "CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000158",
"url": "https://www.suse.com/security/cve/CVE-2017-1000158"
},
{
"category": "external",
"summary": "SUSE Bug 1068664 for CVE-2017-1000158",
"url": "https://bugzilla.suse.com/1068664"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000158"
},
{
"cve": "CVE-2017-18207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18207"
}
],
"notes": [
{
"category": "general",
"text": "The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18207",
"url": "https://www.suse.com/security/cve/CVE-2017-18207"
},
{
"category": "external",
"summary": "SUSE Bug 1083507 for CVE-2017-18207",
"url": "https://bugzilla.suse.com/1083507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-18207"
},
{
"cve": "CVE-2018-1000030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000030"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3-\u003eMalloc-\u003eThread1-\u003eFree\u0027s-\u003eThread2-Re-uses-Free\u0027d Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an attacker to violate a trust boundary, as such the DWF feels this issue deserves a CVE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000030",
"url": "https://www.suse.com/security/cve/CVE-2018-1000030"
},
{
"category": "external",
"summary": "SUSE Bug 1079300 for CVE-2018-1000030",
"url": "https://bugzilla.suse.com/1079300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-1000030"
},
{
"cve": "CVE-2018-1000802",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000802"
}
],
"notes": [
{
"category": "general",
"text": "Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000802",
"url": "https://www.suse.com/security/cve/CVE-2018-1000802"
},
{
"category": "external",
"summary": "SUSE Bug 1109663 for CVE-2018-1000802",
"url": "https://bugzilla.suse.com/1109663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000802"
},
{
"cve": "CVE-2018-1060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1060"
}
],
"notes": [
{
"category": "general",
"text": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib\u0027s apop() method. An attacker could use this flaw to cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1060",
"url": "https://www.suse.com/security/cve/CVE-2018-1060"
},
{
"category": "external",
"summary": "SUSE Bug 1088009 for CVE-2018-1060",
"url": "https://bugzilla.suse.com/1088009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-1060"
},
{
"cve": "CVE-2018-1061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1061"
}
],
"notes": [
{
"category": "general",
"text": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1061",
"url": "https://www.suse.com/security/cve/CVE-2018-1061"
},
{
"category": "external",
"summary": "SUSE Bug 1088004 for CVE-2018-1061",
"url": "https://bugzilla.suse.com/1088004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-1061"
},
{
"cve": "CVE-2018-14647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14647"
}
],
"notes": [
{
"category": "general",
"text": "Python\u0027s elementtree C accelerator failed to initialise Expat\u0027s hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat\u0027s internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14647",
"url": "https://www.suse.com/security/cve/CVE-2018-14647"
},
{
"category": "external",
"summary": "SUSE Bug 1109847 for CVE-2018-14647",
"url": "https://bugzilla.suse.com/1109847"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2018-14647",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-14647"
},
{
"cve": "CVE-2018-20852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20852"
}
],
"notes": [
{
"category": "general",
"text": "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20852",
"url": "https://www.suse.com/security/cve/CVE-2018-20852"
},
{
"category": "external",
"summary": "SUSE Bug 1141853 for CVE-2018-20852",
"url": "https://bugzilla.suse.com/1141853"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20852"
},
{
"cve": "CVE-2019-10160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10160"
}
],
"notes": [
{
"category": "general",
"text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10160",
"url": "https://www.suse.com/security/cve/CVE-2019-10160"
},
{
"category": "external",
"summary": "SUSE Bug 1138459 for CVE-2019-10160",
"url": "https://bugzilla.suse.com/1138459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-10160"
},
{
"cve": "CVE-2019-16056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16056"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16056",
"url": "https://www.suse.com/security/cve/CVE-2019-16056"
},
{
"category": "external",
"summary": "SUSE Bug 1149955 for CVE-2019-16056",
"url": "https://bugzilla.suse.com/1149955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16056"
},
{
"cve": "CVE-2019-16935",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16935"
}
],
"notes": [
{
"category": "general",
"text": "The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16935",
"url": "https://www.suse.com/security/cve/CVE-2019-16935"
},
{
"category": "external",
"summary": "SUSE Bug 1153238 for CVE-2019-16935",
"url": "https://bugzilla.suse.com/1153238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16935"
},
{
"cve": "CVE-2019-18348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18348"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18348",
"url": "https://www.suse.com/security/cve/CVE-2019-18348"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-18348",
"url": "https://bugzilla.suse.com/1155094"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18348"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9636"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9636",
"url": "https://www.suse.com/security/cve/CVE-2019-9636"
},
{
"category": "external",
"summary": "SUSE Bug 1129346 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1129346"
},
{
"category": "external",
"summary": "SUSE Bug 1135433 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1135433"
},
{
"category": "external",
"summary": "SUSE Bug 1138459 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1138459"
},
{
"category": "external",
"summary": "SUSE Bug 1145004 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1145004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9636"
},
{
"cve": "CVE-2019-9674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9674"
}
],
"notes": [
{
"category": "general",
"text": "Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9674",
"url": "https://www.suse.com/security/cve/CVE-2019-9674"
},
{
"category": "external",
"summary": "SUSE Bug 1162825 for CVE-2019-9674",
"url": "https://bugzilla.suse.com/1162825"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9674"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2019-9948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9948"
}
],
"notes": [
{
"category": "general",
"text": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen(\u0027local_file:///etc/passwd\u0027) call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9948",
"url": "https://www.suse.com/security/cve/CVE-2019-9948"
},
{
"category": "external",
"summary": "SUSE Bug 1130847 for CVE-2019-9948",
"url": "https://bugzilla.suse.com/1130847"
},
{
"category": "external",
"summary": "SUSE Bug 1135433 for CVE-2019-9948",
"url": "https://bugzilla.suse.com/1135433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-9948"
},
{
"cve": "CVE-2020-8492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8492"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8492",
"url": "https://www.suse.com/security/cve/CVE-2020-8492"
},
{
"category": "external",
"summary": "SUSE Bug 1162367 for CVE-2020-8492",
"url": "https://bugzilla.suse.com/1162367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2021-23336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23336"
}
],
"notes": [
{
"category": "general",
"text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23336",
"url": "https://www.suse.com/security/cve/CVE-2021-23336"
},
{
"category": "external",
"summary": "SUSE Bug 1182179 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182179"
},
{
"category": "external",
"summary": "SUSE Bug 1182379 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182379"
},
{
"category": "external",
"summary": "SUSE Bug 1182433 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3177"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3177",
"url": "https://www.suse.com/security/cve/CVE-2021-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1181126 for CVE-2021-3177",
"url": "https://bugzilla.suse.com/1181126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-3733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3733"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in urllib\u0027s AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3733",
"url": "https://www.suse.com/security/cve/CVE-2021-3733"
},
{
"category": "external",
"summary": "SUSE Bug 1189287 for CVE-2021-3733",
"url": "https://bugzilla.suse.com/1189287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3733"
},
{
"cve": "CVE-2021-3737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3737"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3737",
"url": "https://www.suse.com/security/cve/CVE-2021-3737"
},
{
"category": "external",
"summary": "SUSE Bug 1189241 for CVE-2021-3737",
"url": "https://bugzilla.suse.com/1189241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x",
"openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3737"
}
]
}
opensuse-su-2024:11283-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python310-3.10.0rc1-4.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python310-3.10.0rc1-4.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11283",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11283-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15523 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15801 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8492 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23336 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3426 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3426/"
}
],
"title": "python310-3.10.0rc1-4.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11283-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.0rc1-4.2.aarch64",
"product": {
"name": "python310-3.10.0rc1-4.2.aarch64",
"product_id": "python310-3.10.0rc1-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "python310-32bit-3.10.0rc1-4.2.aarch64",
"product": {
"name": "python310-32bit-3.10.0rc1-4.2.aarch64",
"product_id": "python310-32bit-3.10.0rc1-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.0rc1-4.2.aarch64",
"product": {
"name": "python310-curses-3.10.0rc1-4.2.aarch64",
"product_id": "python310-curses-3.10.0rc1-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.0rc1-4.2.aarch64",
"product": {
"name": "python310-dbm-3.10.0rc1-4.2.aarch64",
"product_id": "python310-dbm-3.10.0rc1-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.0rc1-4.2.aarch64",
"product": {
"name": "python310-idle-3.10.0rc1-4.2.aarch64",
"product_id": "python310-idle-3.10.0rc1-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.0rc1-4.2.aarch64",
"product": {
"name": "python310-tk-3.10.0rc1-4.2.aarch64",
"product_id": "python310-tk-3.10.0rc1-4.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.0rc1-4.2.ppc64le",
"product": {
"name": "python310-3.10.0rc1-4.2.ppc64le",
"product_id": "python310-3.10.0rc1-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-32bit-3.10.0rc1-4.2.ppc64le",
"product": {
"name": "python310-32bit-3.10.0rc1-4.2.ppc64le",
"product_id": "python310-32bit-3.10.0rc1-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.0rc1-4.2.ppc64le",
"product": {
"name": "python310-curses-3.10.0rc1-4.2.ppc64le",
"product_id": "python310-curses-3.10.0rc1-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.0rc1-4.2.ppc64le",
"product": {
"name": "python310-dbm-3.10.0rc1-4.2.ppc64le",
"product_id": "python310-dbm-3.10.0rc1-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.0rc1-4.2.ppc64le",
"product": {
"name": "python310-idle-3.10.0rc1-4.2.ppc64le",
"product_id": "python310-idle-3.10.0rc1-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.0rc1-4.2.ppc64le",
"product": {
"name": "python310-tk-3.10.0rc1-4.2.ppc64le",
"product_id": "python310-tk-3.10.0rc1-4.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.0rc1-4.2.s390x",
"product": {
"name": "python310-3.10.0rc1-4.2.s390x",
"product_id": "python310-3.10.0rc1-4.2.s390x"
}
},
{
"category": "product_version",
"name": "python310-32bit-3.10.0rc1-4.2.s390x",
"product": {
"name": "python310-32bit-3.10.0rc1-4.2.s390x",
"product_id": "python310-32bit-3.10.0rc1-4.2.s390x"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.0rc1-4.2.s390x",
"product": {
"name": "python310-curses-3.10.0rc1-4.2.s390x",
"product_id": "python310-curses-3.10.0rc1-4.2.s390x"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.0rc1-4.2.s390x",
"product": {
"name": "python310-dbm-3.10.0rc1-4.2.s390x",
"product_id": "python310-dbm-3.10.0rc1-4.2.s390x"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.0rc1-4.2.s390x",
"product": {
"name": "python310-idle-3.10.0rc1-4.2.s390x",
"product_id": "python310-idle-3.10.0rc1-4.2.s390x"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.0rc1-4.2.s390x",
"product": {
"name": "python310-tk-3.10.0rc1-4.2.s390x",
"product_id": "python310-tk-3.10.0rc1-4.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.0rc1-4.2.x86_64",
"product": {
"name": "python310-3.10.0rc1-4.2.x86_64",
"product_id": "python310-3.10.0rc1-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "python310-32bit-3.10.0rc1-4.2.x86_64",
"product": {
"name": "python310-32bit-3.10.0rc1-4.2.x86_64",
"product_id": "python310-32bit-3.10.0rc1-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.0rc1-4.2.x86_64",
"product": {
"name": "python310-curses-3.10.0rc1-4.2.x86_64",
"product_id": "python310-curses-3.10.0rc1-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.0rc1-4.2.x86_64",
"product": {
"name": "python310-dbm-3.10.0rc1-4.2.x86_64",
"product_id": "python310-dbm-3.10.0rc1-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.0rc1-4.2.x86_64",
"product": {
"name": "python310-idle-3.10.0rc1-4.2.x86_64",
"product_id": "python310-idle-3.10.0rc1-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.0rc1-4.2.x86_64",
"product": {
"name": "python310-tk-3.10.0rc1-4.2.x86_64",
"product_id": "python310-tk-3.10.0rc1-4.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.0rc1-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64"
},
"product_reference": "python310-3.10.0rc1-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.0rc1-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le"
},
"product_reference": "python310-3.10.0rc1-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.0rc1-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x"
},
"product_reference": "python310-3.10.0rc1-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.0rc1-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64"
},
"product_reference": "python310-3.10.0rc1-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-32bit-3.10.0rc1-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64"
},
"product_reference": "python310-32bit-3.10.0rc1-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-32bit-3.10.0rc1-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le"
},
"product_reference": "python310-32bit-3.10.0rc1-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-32bit-3.10.0rc1-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x"
},
"product_reference": "python310-32bit-3.10.0rc1-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-32bit-3.10.0rc1-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64"
},
"product_reference": "python310-32bit-3.10.0rc1-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.0rc1-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64"
},
"product_reference": "python310-curses-3.10.0rc1-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.0rc1-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le"
},
"product_reference": "python310-curses-3.10.0rc1-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.0rc1-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x"
},
"product_reference": "python310-curses-3.10.0rc1-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.0rc1-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64"
},
"product_reference": "python310-curses-3.10.0rc1-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.0rc1-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64"
},
"product_reference": "python310-dbm-3.10.0rc1-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.0rc1-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le"
},
"product_reference": "python310-dbm-3.10.0rc1-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.0rc1-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x"
},
"product_reference": "python310-dbm-3.10.0rc1-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.0rc1-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64"
},
"product_reference": "python310-dbm-3.10.0rc1-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.0rc1-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64"
},
"product_reference": "python310-idle-3.10.0rc1-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.0rc1-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le"
},
"product_reference": "python310-idle-3.10.0rc1-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.0rc1-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x"
},
"product_reference": "python310-idle-3.10.0rc1-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.0rc1-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64"
},
"product_reference": "python310-idle-3.10.0rc1-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.0rc1-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64"
},
"product_reference": "python310-tk-3.10.0rc1-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.0rc1-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le"
},
"product_reference": "python310-tk-3.10.0rc1-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.0rc1-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x"
},
"product_reference": "python310-tk-3.10.0rc1-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.0rc1-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
},
"product_reference": "python310-tk-3.10.0rc1-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2019-20907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20907"
}
],
"notes": [
{
"category": "general",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20907",
"url": "https://www.suse.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "SUSE Bug 1174091 for CVE-2019-20907",
"url": "https://bugzilla.suse.com/1174091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2020-15523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15523"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15523",
"url": "https://www.suse.com/security/cve/CVE-2020-15523"
},
{
"category": "external",
"summary": "SUSE Bug 1173745 for CVE-2020-15523",
"url": "https://bugzilla.suse.com/1173745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15523"
},
{
"cve": "CVE-2020-15801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15801"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15801",
"url": "https://www.suse.com/security/cve/CVE-2020-15801"
},
{
"category": "external",
"summary": "SUSE Bug 1174241 for CVE-2020-15801",
"url": "https://bugzilla.suse.com/1174241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-15801"
},
{
"cve": "CVE-2020-8492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8492"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8492",
"url": "https://www.suse.com/security/cve/CVE-2020-8492"
},
{
"category": "external",
"summary": "SUSE Bug 1162367 for CVE-2020-8492",
"url": "https://bugzilla.suse.com/1162367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2021-23336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23336"
}
],
"notes": [
{
"category": "general",
"text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23336",
"url": "https://www.suse.com/security/cve/CVE-2021-23336"
},
{
"category": "external",
"summary": "SUSE Bug 1182179 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182179"
},
{
"category": "external",
"summary": "SUSE Bug 1182379 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182379"
},
{
"category": "external",
"summary": "SUSE Bug 1182433 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3177"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3177",
"url": "https://www.suse.com/security/cve/CVE-2021-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1181126 for CVE-2021-3177",
"url": "https://bugzilla.suse.com/1181126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-3426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3426"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3426",
"url": "https://www.suse.com/security/cve/CVE-2021-3426"
},
{
"category": "external",
"summary": "SUSE Bug 1183374 for CVE-2021-3426",
"url": "https://bugzilla.suse.com/1183374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.0rc1-4.2.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.0rc1-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3426"
}
]
}
opensuse-su-2024:11286-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python39-3.9.7-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python39-3.9.7-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11286",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11286-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15523 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15801 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8492 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23336 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29921 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3426 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3733 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3737 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3737/"
}
],
"title": "python39-3.9.7-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11286-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python39-3.9.7-2.1.aarch64",
"product": {
"name": "python39-3.9.7-2.1.aarch64",
"product_id": "python39-3.9.7-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-32bit-3.9.7-2.1.aarch64",
"product": {
"name": "python39-32bit-3.9.7-2.1.aarch64",
"product_id": "python39-32bit-3.9.7-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.7-2.1.aarch64",
"product": {
"name": "python39-curses-3.9.7-2.1.aarch64",
"product_id": "python39-curses-3.9.7-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.7-2.1.aarch64",
"product": {
"name": "python39-dbm-3.9.7-2.1.aarch64",
"product_id": "python39-dbm-3.9.7-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.7-2.1.aarch64",
"product": {
"name": "python39-idle-3.9.7-2.1.aarch64",
"product_id": "python39-idle-3.9.7-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.7-2.1.aarch64",
"product": {
"name": "python39-tk-3.9.7-2.1.aarch64",
"product_id": "python39-tk-3.9.7-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python39-3.9.7-2.1.ppc64le",
"product": {
"name": "python39-3.9.7-2.1.ppc64le",
"product_id": "python39-3.9.7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-32bit-3.9.7-2.1.ppc64le",
"product": {
"name": "python39-32bit-3.9.7-2.1.ppc64le",
"product_id": "python39-32bit-3.9.7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.7-2.1.ppc64le",
"product": {
"name": "python39-curses-3.9.7-2.1.ppc64le",
"product_id": "python39-curses-3.9.7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.7-2.1.ppc64le",
"product": {
"name": "python39-dbm-3.9.7-2.1.ppc64le",
"product_id": "python39-dbm-3.9.7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.7-2.1.ppc64le",
"product": {
"name": "python39-idle-3.9.7-2.1.ppc64le",
"product_id": "python39-idle-3.9.7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.7-2.1.ppc64le",
"product": {
"name": "python39-tk-3.9.7-2.1.ppc64le",
"product_id": "python39-tk-3.9.7-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python39-3.9.7-2.1.s390x",
"product": {
"name": "python39-3.9.7-2.1.s390x",
"product_id": "python39-3.9.7-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-32bit-3.9.7-2.1.s390x",
"product": {
"name": "python39-32bit-3.9.7-2.1.s390x",
"product_id": "python39-32bit-3.9.7-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.7-2.1.s390x",
"product": {
"name": "python39-curses-3.9.7-2.1.s390x",
"product_id": "python39-curses-3.9.7-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.7-2.1.s390x",
"product": {
"name": "python39-dbm-3.9.7-2.1.s390x",
"product_id": "python39-dbm-3.9.7-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.7-2.1.s390x",
"product": {
"name": "python39-idle-3.9.7-2.1.s390x",
"product_id": "python39-idle-3.9.7-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.7-2.1.s390x",
"product": {
"name": "python39-tk-3.9.7-2.1.s390x",
"product_id": "python39-tk-3.9.7-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python39-3.9.7-2.1.x86_64",
"product": {
"name": "python39-3.9.7-2.1.x86_64",
"product_id": "python39-3.9.7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-32bit-3.9.7-2.1.x86_64",
"product": {
"name": "python39-32bit-3.9.7-2.1.x86_64",
"product_id": "python39-32bit-3.9.7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.7-2.1.x86_64",
"product": {
"name": "python39-curses-3.9.7-2.1.x86_64",
"product_id": "python39-curses-3.9.7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.7-2.1.x86_64",
"product": {
"name": "python39-dbm-3.9.7-2.1.x86_64",
"product_id": "python39-dbm-3.9.7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.7-2.1.x86_64",
"product": {
"name": "python39-idle-3.9.7-2.1.x86_64",
"product_id": "python39-idle-3.9.7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.7-2.1.x86_64",
"product": {
"name": "python39-tk-3.9.7-2.1.x86_64",
"product_id": "python39-tk-3.9.7-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.7-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64"
},
"product_reference": "python39-3.9.7-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.7-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le"
},
"product_reference": "python39-3.9.7-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.7-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-3.9.7-2.1.s390x"
},
"product_reference": "python39-3.9.7-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.7-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64"
},
"product_reference": "python39-3.9.7-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-32bit-3.9.7-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64"
},
"product_reference": "python39-32bit-3.9.7-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-32bit-3.9.7-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le"
},
"product_reference": "python39-32bit-3.9.7-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-32bit-3.9.7-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x"
},
"product_reference": "python39-32bit-3.9.7-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-32bit-3.9.7-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64"
},
"product_reference": "python39-32bit-3.9.7-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.7-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64"
},
"product_reference": "python39-curses-3.9.7-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.7-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le"
},
"product_reference": "python39-curses-3.9.7-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.7-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x"
},
"product_reference": "python39-curses-3.9.7-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.7-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64"
},
"product_reference": "python39-curses-3.9.7-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.7-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64"
},
"product_reference": "python39-dbm-3.9.7-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.7-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le"
},
"product_reference": "python39-dbm-3.9.7-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.7-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x"
},
"product_reference": "python39-dbm-3.9.7-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.7-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64"
},
"product_reference": "python39-dbm-3.9.7-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.7-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64"
},
"product_reference": "python39-idle-3.9.7-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.7-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le"
},
"product_reference": "python39-idle-3.9.7-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.7-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x"
},
"product_reference": "python39-idle-3.9.7-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.7-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64"
},
"product_reference": "python39-idle-3.9.7-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.7-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64"
},
"product_reference": "python39-tk-3.9.7-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.7-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le"
},
"product_reference": "python39-tk-3.9.7-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.7-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x"
},
"product_reference": "python39-tk-3.9.7-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.7-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
},
"product_reference": "python39-tk-3.9.7-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2019-20907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20907"
}
],
"notes": [
{
"category": "general",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20907",
"url": "https://www.suse.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "SUSE Bug 1174091 for CVE-2019-20907",
"url": "https://bugzilla.suse.com/1174091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2020-15523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15523"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15523",
"url": "https://www.suse.com/security/cve/CVE-2020-15523"
},
{
"category": "external",
"summary": "SUSE Bug 1173745 for CVE-2020-15523",
"url": "https://bugzilla.suse.com/1173745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15523"
},
{
"cve": "CVE-2020-15801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15801"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15801",
"url": "https://www.suse.com/security/cve/CVE-2020-15801"
},
{
"category": "external",
"summary": "SUSE Bug 1174241 for CVE-2020-15801",
"url": "https://bugzilla.suse.com/1174241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-15801"
},
{
"cve": "CVE-2020-8492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8492"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8492",
"url": "https://www.suse.com/security/cve/CVE-2020-8492"
},
{
"category": "external",
"summary": "SUSE Bug 1162367 for CVE-2020-8492",
"url": "https://bugzilla.suse.com/1162367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2021-23336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23336"
}
],
"notes": [
{
"category": "general",
"text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23336",
"url": "https://www.suse.com/security/cve/CVE-2021-23336"
},
{
"category": "external",
"summary": "SUSE Bug 1182179 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182179"
},
{
"category": "external",
"summary": "SUSE Bug 1182379 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182379"
},
{
"category": "external",
"summary": "SUSE Bug 1182433 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-29921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29921"
}
],
"notes": [
{
"category": "general",
"text": "In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29921",
"url": "https://www.suse.com/security/cve/CVE-2021-29921"
},
{
"category": "external",
"summary": "SUSE Bug 1185706 for CVE-2021-29921",
"url": "https://bugzilla.suse.com/1185706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-29921"
},
{
"cve": "CVE-2021-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3177"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3177",
"url": "https://www.suse.com/security/cve/CVE-2021-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1181126 for CVE-2021-3177",
"url": "https://bugzilla.suse.com/1181126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-3426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3426"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3426",
"url": "https://www.suse.com/security/cve/CVE-2021-3426"
},
{
"category": "external",
"summary": "SUSE Bug 1183374 for CVE-2021-3426",
"url": "https://bugzilla.suse.com/1183374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3426"
},
{
"cve": "CVE-2021-3733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3733"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in urllib\u0027s AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3733",
"url": "https://www.suse.com/security/cve/CVE-2021-3733"
},
{
"category": "external",
"summary": "SUSE Bug 1189287 for CVE-2021-3733",
"url": "https://bugzilla.suse.com/1189287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3733"
},
{
"cve": "CVE-2021-3737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3737"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3737",
"url": "https://www.suse.com/security/cve/CVE-2021-3737"
},
{
"category": "external",
"summary": "SUSE Bug 1189241 for CVE-2021-3737",
"url": "https://bugzilla.suse.com/1189241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-32bit-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.7-2.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3737"
}
]
}
opensuse-su-2024:12089-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python311-3.11.0b1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python311-3.11.0b1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12089",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12089-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15523 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15801 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8492 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23336 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3426 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3426/"
}
],
"title": "python311-3.11.0b1-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12089-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-3.11.0b1-1.1.aarch64",
"product": {
"name": "python311-3.11.0b1-1.1.aarch64",
"product_id": "python311-3.11.0b1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-32bit-3.11.0b1-1.1.aarch64",
"product": {
"name": "python311-32bit-3.11.0b1-1.1.aarch64",
"product_id": "python311-32bit-3.11.0b1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.0b1-1.1.aarch64",
"product": {
"name": "python311-curses-3.11.0b1-1.1.aarch64",
"product_id": "python311-curses-3.11.0b1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.0b1-1.1.aarch64",
"product": {
"name": "python311-dbm-3.11.0b1-1.1.aarch64",
"product_id": "python311-dbm-3.11.0b1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.0b1-1.1.aarch64",
"product": {
"name": "python311-idle-3.11.0b1-1.1.aarch64",
"product_id": "python311-idle-3.11.0b1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.0b1-1.1.aarch64",
"product": {
"name": "python311-tk-3.11.0b1-1.1.aarch64",
"product_id": "python311-tk-3.11.0b1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-3.11.0b1-1.1.ppc64le",
"product": {
"name": "python311-3.11.0b1-1.1.ppc64le",
"product_id": "python311-3.11.0b1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-32bit-3.11.0b1-1.1.ppc64le",
"product": {
"name": "python311-32bit-3.11.0b1-1.1.ppc64le",
"product_id": "python311-32bit-3.11.0b1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.0b1-1.1.ppc64le",
"product": {
"name": "python311-curses-3.11.0b1-1.1.ppc64le",
"product_id": "python311-curses-3.11.0b1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.0b1-1.1.ppc64le",
"product": {
"name": "python311-dbm-3.11.0b1-1.1.ppc64le",
"product_id": "python311-dbm-3.11.0b1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.0b1-1.1.ppc64le",
"product": {
"name": "python311-idle-3.11.0b1-1.1.ppc64le",
"product_id": "python311-idle-3.11.0b1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.0b1-1.1.ppc64le",
"product": {
"name": "python311-tk-3.11.0b1-1.1.ppc64le",
"product_id": "python311-tk-3.11.0b1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-3.11.0b1-1.1.s390x",
"product": {
"name": "python311-3.11.0b1-1.1.s390x",
"product_id": "python311-3.11.0b1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-32bit-3.11.0b1-1.1.s390x",
"product": {
"name": "python311-32bit-3.11.0b1-1.1.s390x",
"product_id": "python311-32bit-3.11.0b1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.0b1-1.1.s390x",
"product": {
"name": "python311-curses-3.11.0b1-1.1.s390x",
"product_id": "python311-curses-3.11.0b1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.0b1-1.1.s390x",
"product": {
"name": "python311-dbm-3.11.0b1-1.1.s390x",
"product_id": "python311-dbm-3.11.0b1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.0b1-1.1.s390x",
"product": {
"name": "python311-idle-3.11.0b1-1.1.s390x",
"product_id": "python311-idle-3.11.0b1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.0b1-1.1.s390x",
"product": {
"name": "python311-tk-3.11.0b1-1.1.s390x",
"product_id": "python311-tk-3.11.0b1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-3.11.0b1-1.1.x86_64",
"product": {
"name": "python311-3.11.0b1-1.1.x86_64",
"product_id": "python311-3.11.0b1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-32bit-3.11.0b1-1.1.x86_64",
"product": {
"name": "python311-32bit-3.11.0b1-1.1.x86_64",
"product_id": "python311-32bit-3.11.0b1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.0b1-1.1.x86_64",
"product": {
"name": "python311-curses-3.11.0b1-1.1.x86_64",
"product_id": "python311-curses-3.11.0b1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.0b1-1.1.x86_64",
"product": {
"name": "python311-dbm-3.11.0b1-1.1.x86_64",
"product_id": "python311-dbm-3.11.0b1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.0b1-1.1.x86_64",
"product": {
"name": "python311-idle-3.11.0b1-1.1.x86_64",
"product_id": "python311-idle-3.11.0b1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.0b1-1.1.x86_64",
"product": {
"name": "python311-tk-3.11.0b1-1.1.x86_64",
"product_id": "python311-tk-3.11.0b1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.0b1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64"
},
"product_reference": "python311-3.11.0b1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.0b1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le"
},
"product_reference": "python311-3.11.0b1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.0b1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x"
},
"product_reference": "python311-3.11.0b1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.0b1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64"
},
"product_reference": "python311-3.11.0b1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-32bit-3.11.0b1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64"
},
"product_reference": "python311-32bit-3.11.0b1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-32bit-3.11.0b1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le"
},
"product_reference": "python311-32bit-3.11.0b1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-32bit-3.11.0b1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x"
},
"product_reference": "python311-32bit-3.11.0b1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-32bit-3.11.0b1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64"
},
"product_reference": "python311-32bit-3.11.0b1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.0b1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64"
},
"product_reference": "python311-curses-3.11.0b1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.0b1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le"
},
"product_reference": "python311-curses-3.11.0b1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.0b1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x"
},
"product_reference": "python311-curses-3.11.0b1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.0b1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64"
},
"product_reference": "python311-curses-3.11.0b1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.0b1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64"
},
"product_reference": "python311-dbm-3.11.0b1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.0b1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le"
},
"product_reference": "python311-dbm-3.11.0b1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.0b1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x"
},
"product_reference": "python311-dbm-3.11.0b1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.0b1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64"
},
"product_reference": "python311-dbm-3.11.0b1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.0b1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64"
},
"product_reference": "python311-idle-3.11.0b1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.0b1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le"
},
"product_reference": "python311-idle-3.11.0b1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.0b1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x"
},
"product_reference": "python311-idle-3.11.0b1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.0b1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64"
},
"product_reference": "python311-idle-3.11.0b1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.0b1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64"
},
"product_reference": "python311-tk-3.11.0b1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.0b1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le"
},
"product_reference": "python311-tk-3.11.0b1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.0b1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x"
},
"product_reference": "python311-tk-3.11.0b1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.0b1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
},
"product_reference": "python311-tk-3.11.0b1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2019-20907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20907"
}
],
"notes": [
{
"category": "general",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20907",
"url": "https://www.suse.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "SUSE Bug 1174091 for CVE-2019-20907",
"url": "https://bugzilla.suse.com/1174091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2020-15523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15523"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15523",
"url": "https://www.suse.com/security/cve/CVE-2020-15523"
},
{
"category": "external",
"summary": "SUSE Bug 1173745 for CVE-2020-15523",
"url": "https://bugzilla.suse.com/1173745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15523"
},
{
"cve": "CVE-2020-15801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15801"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15801",
"url": "https://www.suse.com/security/cve/CVE-2020-15801"
},
{
"category": "external",
"summary": "SUSE Bug 1174241 for CVE-2020-15801",
"url": "https://bugzilla.suse.com/1174241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-15801"
},
{
"cve": "CVE-2020-8492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8492"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8492",
"url": "https://www.suse.com/security/cve/CVE-2020-8492"
},
{
"category": "external",
"summary": "SUSE Bug 1162367 for CVE-2020-8492",
"url": "https://bugzilla.suse.com/1162367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2021-23336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23336"
}
],
"notes": [
{
"category": "general",
"text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23336",
"url": "https://www.suse.com/security/cve/CVE-2021-23336"
},
{
"category": "external",
"summary": "SUSE Bug 1182179 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182179"
},
{
"category": "external",
"summary": "SUSE Bug 1182379 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182379"
},
{
"category": "external",
"summary": "SUSE Bug 1182433 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3177"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3177",
"url": "https://www.suse.com/security/cve/CVE-2021-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1181126 for CVE-2021-3177",
"url": "https://bugzilla.suse.com/1181126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-3426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3426"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3426",
"url": "https://www.suse.com/security/cve/CVE-2021-3426"
},
{
"category": "external",
"summary": "SUSE Bug 1183374 for CVE-2021-3426",
"url": "https://bugzilla.suse.com/1183374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.0b1-1.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.0b1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3426"
}
]
}
opensuse-su-2024:11285-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python38-3.8.12-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python38-3.8.12-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11285",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11285-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-0340 page",
"url": "https://www.suse.com/security/cve/CVE-2013-0340/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20916 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26116 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8492 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23336 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3426 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3426/"
}
],
"title": "python38-3.8.12-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11285-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python38-3.8.12-1.2.aarch64",
"product": {
"name": "python38-3.8.12-1.2.aarch64",
"product_id": "python38-3.8.12-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "python38-32bit-3.8.12-1.2.aarch64",
"product": {
"name": "python38-32bit-3.8.12-1.2.aarch64",
"product_id": "python38-32bit-3.8.12-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "python38-curses-3.8.12-1.2.aarch64",
"product": {
"name": "python38-curses-3.8.12-1.2.aarch64",
"product_id": "python38-curses-3.8.12-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "python38-dbm-3.8.12-1.2.aarch64",
"product": {
"name": "python38-dbm-3.8.12-1.2.aarch64",
"product_id": "python38-dbm-3.8.12-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "python38-idle-3.8.12-1.2.aarch64",
"product": {
"name": "python38-idle-3.8.12-1.2.aarch64",
"product_id": "python38-idle-3.8.12-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "python38-tk-3.8.12-1.2.aarch64",
"product": {
"name": "python38-tk-3.8.12-1.2.aarch64",
"product_id": "python38-tk-3.8.12-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python38-3.8.12-1.2.ppc64le",
"product": {
"name": "python38-3.8.12-1.2.ppc64le",
"product_id": "python38-3.8.12-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-32bit-3.8.12-1.2.ppc64le",
"product": {
"name": "python38-32bit-3.8.12-1.2.ppc64le",
"product_id": "python38-32bit-3.8.12-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-curses-3.8.12-1.2.ppc64le",
"product": {
"name": "python38-curses-3.8.12-1.2.ppc64le",
"product_id": "python38-curses-3.8.12-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-dbm-3.8.12-1.2.ppc64le",
"product": {
"name": "python38-dbm-3.8.12-1.2.ppc64le",
"product_id": "python38-dbm-3.8.12-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-idle-3.8.12-1.2.ppc64le",
"product": {
"name": "python38-idle-3.8.12-1.2.ppc64le",
"product_id": "python38-idle-3.8.12-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-tk-3.8.12-1.2.ppc64le",
"product": {
"name": "python38-tk-3.8.12-1.2.ppc64le",
"product_id": "python38-tk-3.8.12-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python38-3.8.12-1.2.s390x",
"product": {
"name": "python38-3.8.12-1.2.s390x",
"product_id": "python38-3.8.12-1.2.s390x"
}
},
{
"category": "product_version",
"name": "python38-32bit-3.8.12-1.2.s390x",
"product": {
"name": "python38-32bit-3.8.12-1.2.s390x",
"product_id": "python38-32bit-3.8.12-1.2.s390x"
}
},
{
"category": "product_version",
"name": "python38-curses-3.8.12-1.2.s390x",
"product": {
"name": "python38-curses-3.8.12-1.2.s390x",
"product_id": "python38-curses-3.8.12-1.2.s390x"
}
},
{
"category": "product_version",
"name": "python38-dbm-3.8.12-1.2.s390x",
"product": {
"name": "python38-dbm-3.8.12-1.2.s390x",
"product_id": "python38-dbm-3.8.12-1.2.s390x"
}
},
{
"category": "product_version",
"name": "python38-idle-3.8.12-1.2.s390x",
"product": {
"name": "python38-idle-3.8.12-1.2.s390x",
"product_id": "python38-idle-3.8.12-1.2.s390x"
}
},
{
"category": "product_version",
"name": "python38-tk-3.8.12-1.2.s390x",
"product": {
"name": "python38-tk-3.8.12-1.2.s390x",
"product_id": "python38-tk-3.8.12-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python38-3.8.12-1.2.x86_64",
"product": {
"name": "python38-3.8.12-1.2.x86_64",
"product_id": "python38-3.8.12-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "python38-32bit-3.8.12-1.2.x86_64",
"product": {
"name": "python38-32bit-3.8.12-1.2.x86_64",
"product_id": "python38-32bit-3.8.12-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "python38-curses-3.8.12-1.2.x86_64",
"product": {
"name": "python38-curses-3.8.12-1.2.x86_64",
"product_id": "python38-curses-3.8.12-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "python38-dbm-3.8.12-1.2.x86_64",
"product": {
"name": "python38-dbm-3.8.12-1.2.x86_64",
"product_id": "python38-dbm-3.8.12-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "python38-idle-3.8.12-1.2.x86_64",
"product": {
"name": "python38-idle-3.8.12-1.2.x86_64",
"product_id": "python38-idle-3.8.12-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "python38-tk-3.8.12-1.2.x86_64",
"product": {
"name": "python38-tk-3.8.12-1.2.x86_64",
"product_id": "python38-tk-3.8.12-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-3.8.12-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64"
},
"product_reference": "python38-3.8.12-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-3.8.12-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le"
},
"product_reference": "python38-3.8.12-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-3.8.12-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-3.8.12-1.2.s390x"
},
"product_reference": "python38-3.8.12-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-3.8.12-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64"
},
"product_reference": "python38-3.8.12-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-32bit-3.8.12-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64"
},
"product_reference": "python38-32bit-3.8.12-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-32bit-3.8.12-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le"
},
"product_reference": "python38-32bit-3.8.12-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-32bit-3.8.12-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x"
},
"product_reference": "python38-32bit-3.8.12-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-32bit-3.8.12-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64"
},
"product_reference": "python38-32bit-3.8.12-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-curses-3.8.12-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64"
},
"product_reference": "python38-curses-3.8.12-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-curses-3.8.12-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le"
},
"product_reference": "python38-curses-3.8.12-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-curses-3.8.12-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x"
},
"product_reference": "python38-curses-3.8.12-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-curses-3.8.12-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64"
},
"product_reference": "python38-curses-3.8.12-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dbm-3.8.12-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64"
},
"product_reference": "python38-dbm-3.8.12-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dbm-3.8.12-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le"
},
"product_reference": "python38-dbm-3.8.12-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dbm-3.8.12-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x"
},
"product_reference": "python38-dbm-3.8.12-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dbm-3.8.12-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64"
},
"product_reference": "python38-dbm-3.8.12-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-idle-3.8.12-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64"
},
"product_reference": "python38-idle-3.8.12-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-idle-3.8.12-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le"
},
"product_reference": "python38-idle-3.8.12-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-idle-3.8.12-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x"
},
"product_reference": "python38-idle-3.8.12-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-idle-3.8.12-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64"
},
"product_reference": "python38-idle-3.8.12-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-tk-3.8.12-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64"
},
"product_reference": "python38-tk-3.8.12-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-tk-3.8.12-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le"
},
"product_reference": "python38-tk-3.8.12-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-tk-3.8.12-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x"
},
"product_reference": "python38-tk-3.8.12-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-tk-3.8.12-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
},
"product_reference": "python38-tk-3.8.12-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-0340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-0340"
}
],
"notes": [
{
"category": "general",
"text": "expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-0340",
"url": "https://www.suse.com/security/cve/CVE-2013-0340"
},
{
"category": "external",
"summary": "SUSE Bug 805236 for CVE-2013-0340",
"url": "https://bugzilla.suse.com/805236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-0340"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2019-20907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20907"
}
],
"notes": [
{
"category": "general",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20907",
"url": "https://www.suse.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "SUSE Bug 1174091 for CVE-2019-20907",
"url": "https://bugzilla.suse.com/1174091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-20916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20916"
}
],
"notes": [
{
"category": "general",
"text": "The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20916",
"url": "https://www.suse.com/security/cve/CVE-2019-20916"
},
{
"category": "external",
"summary": "SUSE Bug 1176262 for CVE-2019-20916",
"url": "https://bugzilla.suse.com/1176262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20916"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2020-26116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26116"
}
],
"notes": [
{
"category": "general",
"text": "http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26116",
"url": "https://www.suse.com/security/cve/CVE-2020-26116"
},
{
"category": "external",
"summary": "SUSE Bug 1177120 for CVE-2020-26116",
"url": "https://bugzilla.suse.com/1177120"
},
{
"category": "external",
"summary": "SUSE Bug 1177211 for CVE-2020-26116",
"url": "https://bugzilla.suse.com/1177211"
},
{
"category": "external",
"summary": "SUSE Bug 1192361 for CVE-2020-26116",
"url": "https://bugzilla.suse.com/1192361"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-26116"
},
{
"cve": "CVE-2020-8492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8492"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8492",
"url": "https://www.suse.com/security/cve/CVE-2020-8492"
},
{
"category": "external",
"summary": "SUSE Bug 1162367 for CVE-2020-8492",
"url": "https://bugzilla.suse.com/1162367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2021-23336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23336"
}
],
"notes": [
{
"category": "general",
"text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23336",
"url": "https://www.suse.com/security/cve/CVE-2021-23336"
},
{
"category": "external",
"summary": "SUSE Bug 1182179 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182179"
},
{
"category": "external",
"summary": "SUSE Bug 1182379 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182379"
},
{
"category": "external",
"summary": "SUSE Bug 1182433 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3177"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3177",
"url": "https://www.suse.com/security/cve/CVE-2021-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1181126 for CVE-2021-3177",
"url": "https://bugzilla.suse.com/1181126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-3426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3426"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3426",
"url": "https://www.suse.com/security/cve/CVE-2021-3426"
},
{
"category": "external",
"summary": "SUSE Bug 1183374 for CVE-2021-3426",
"url": "https://bugzilla.suse.com/1183374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-32bit-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.12-1.2.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.12-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3426"
}
]
}
opensuse-su-2024:14109-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python313-3.13.0~b3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python313-3.13.0~b3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14109",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14109-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10735 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15523 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15801 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8492 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23336 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3426 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-25236 page",
"url": "https://www.suse.com/security/cve/CVE-2022-25236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42919 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45061 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0286 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-24329 page",
"url": "https://www.suse.com/security/cve/CVE-2023-24329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2650 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-27043 page",
"url": "https://www.suse.com/security/cve/CVE-2023-27043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-40217 page",
"url": "https://www.suse.com/security/cve/CVE-2023-40217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52425 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4030 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4030/"
}
],
"title": "python313-3.13.0~b3-1.1 on GA media",
"tracking": {
"current_release_date": "2024-07-05T00:00:00Z",
"generator": {
"date": "2024-07-05T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14109-1",
"initial_release_date": "2024-07-05T00:00:00Z",
"revision_history": [
{
"date": "2024-07-05T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python313-3.13.0~b3-1.1.aarch64",
"product": {
"name": "python313-3.13.0~b3-1.1.aarch64",
"product_id": "python313-3.13.0~b3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-curses-3.13.0~b3-1.1.aarch64",
"product": {
"name": "python313-curses-3.13.0~b3-1.1.aarch64",
"product_id": "python313-curses-3.13.0~b3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-dbm-3.13.0~b3-1.1.aarch64",
"product": {
"name": "python313-dbm-3.13.0~b3-1.1.aarch64",
"product_id": "python313-dbm-3.13.0~b3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-idle-3.13.0~b3-1.1.aarch64",
"product": {
"name": "python313-idle-3.13.0~b3-1.1.aarch64",
"product_id": "python313-idle-3.13.0~b3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-tk-3.13.0~b3-1.1.aarch64",
"product": {
"name": "python313-tk-3.13.0~b3-1.1.aarch64",
"product_id": "python313-tk-3.13.0~b3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"product": {
"name": "python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"product_id": "python313-x86-64-v3-3.13.0~b3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python313-3.13.0~b3-1.1.ppc64le",
"product": {
"name": "python313-3.13.0~b3-1.1.ppc64le",
"product_id": "python313-3.13.0~b3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-curses-3.13.0~b3-1.1.ppc64le",
"product": {
"name": "python313-curses-3.13.0~b3-1.1.ppc64le",
"product_id": "python313-curses-3.13.0~b3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-dbm-3.13.0~b3-1.1.ppc64le",
"product": {
"name": "python313-dbm-3.13.0~b3-1.1.ppc64le",
"product_id": "python313-dbm-3.13.0~b3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-idle-3.13.0~b3-1.1.ppc64le",
"product": {
"name": "python313-idle-3.13.0~b3-1.1.ppc64le",
"product_id": "python313-idle-3.13.0~b3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-tk-3.13.0~b3-1.1.ppc64le",
"product": {
"name": "python313-tk-3.13.0~b3-1.1.ppc64le",
"product_id": "python313-tk-3.13.0~b3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"product": {
"name": "python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"product_id": "python313-x86-64-v3-3.13.0~b3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python313-3.13.0~b3-1.1.s390x",
"product": {
"name": "python313-3.13.0~b3-1.1.s390x",
"product_id": "python313-3.13.0~b3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-curses-3.13.0~b3-1.1.s390x",
"product": {
"name": "python313-curses-3.13.0~b3-1.1.s390x",
"product_id": "python313-curses-3.13.0~b3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-dbm-3.13.0~b3-1.1.s390x",
"product": {
"name": "python313-dbm-3.13.0~b3-1.1.s390x",
"product_id": "python313-dbm-3.13.0~b3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-idle-3.13.0~b3-1.1.s390x",
"product": {
"name": "python313-idle-3.13.0~b3-1.1.s390x",
"product_id": "python313-idle-3.13.0~b3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-tk-3.13.0~b3-1.1.s390x",
"product": {
"name": "python313-tk-3.13.0~b3-1.1.s390x",
"product_id": "python313-tk-3.13.0~b3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"product": {
"name": "python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"product_id": "python313-x86-64-v3-3.13.0~b3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python313-3.13.0~b3-1.1.x86_64",
"product": {
"name": "python313-3.13.0~b3-1.1.x86_64",
"product_id": "python313-3.13.0~b3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-curses-3.13.0~b3-1.1.x86_64",
"product": {
"name": "python313-curses-3.13.0~b3-1.1.x86_64",
"product_id": "python313-curses-3.13.0~b3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-dbm-3.13.0~b3-1.1.x86_64",
"product": {
"name": "python313-dbm-3.13.0~b3-1.1.x86_64",
"product_id": "python313-dbm-3.13.0~b3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-idle-3.13.0~b3-1.1.x86_64",
"product": {
"name": "python313-idle-3.13.0~b3-1.1.x86_64",
"product_id": "python313-idle-3.13.0~b3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-tk-3.13.0~b3-1.1.x86_64",
"product": {
"name": "python313-tk-3.13.0~b3-1.1.x86_64",
"product_id": "python313-tk-3.13.0~b3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-x86-64-v3-3.13.0~b3-1.1.x86_64",
"product": {
"name": "python313-x86-64-v3-3.13.0~b3-1.1.x86_64",
"product_id": "python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-3.13.0~b3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64"
},
"product_reference": "python313-3.13.0~b3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-3.13.0~b3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le"
},
"product_reference": "python313-3.13.0~b3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-3.13.0~b3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x"
},
"product_reference": "python313-3.13.0~b3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-3.13.0~b3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64"
},
"product_reference": "python313-3.13.0~b3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-curses-3.13.0~b3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64"
},
"product_reference": "python313-curses-3.13.0~b3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-curses-3.13.0~b3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le"
},
"product_reference": "python313-curses-3.13.0~b3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-curses-3.13.0~b3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x"
},
"product_reference": "python313-curses-3.13.0~b3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-curses-3.13.0~b3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64"
},
"product_reference": "python313-curses-3.13.0~b3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-dbm-3.13.0~b3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64"
},
"product_reference": "python313-dbm-3.13.0~b3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-dbm-3.13.0~b3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le"
},
"product_reference": "python313-dbm-3.13.0~b3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-dbm-3.13.0~b3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x"
},
"product_reference": "python313-dbm-3.13.0~b3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-dbm-3.13.0~b3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64"
},
"product_reference": "python313-dbm-3.13.0~b3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-idle-3.13.0~b3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64"
},
"product_reference": "python313-idle-3.13.0~b3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-idle-3.13.0~b3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le"
},
"product_reference": "python313-idle-3.13.0~b3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-idle-3.13.0~b3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x"
},
"product_reference": "python313-idle-3.13.0~b3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-idle-3.13.0~b3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64"
},
"product_reference": "python313-idle-3.13.0~b3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-tk-3.13.0~b3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64"
},
"product_reference": "python313-tk-3.13.0~b3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-tk-3.13.0~b3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le"
},
"product_reference": "python313-tk-3.13.0~b3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-tk-3.13.0~b3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x"
},
"product_reference": "python313-tk-3.13.0~b3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-tk-3.13.0~b3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64"
},
"product_reference": "python313-tk-3.13.0~b3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-x86-64-v3-3.13.0~b3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64"
},
"product_reference": "python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-x86-64-v3-3.13.0~b3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le"
},
"product_reference": "python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-x86-64-v3-3.13.0~b3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x"
},
"product_reference": "python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-x86-64-v3-3.13.0~b3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
},
"product_reference": "python313-x86-64-v3-3.13.0~b3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2019-20907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20907"
}
],
"notes": [
{
"category": "general",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20907",
"url": "https://www.suse.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "SUSE Bug 1174091 for CVE-2019-20907",
"url": "https://bugzilla.suse.com/1174091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2020-10735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10735"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10735",
"url": "https://www.suse.com/security/cve/CVE-2020-10735"
},
{
"category": "external",
"summary": "SUSE Bug 1203125 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1203125"
},
{
"category": "external",
"summary": "SUSE Bug 1204077 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204077"
},
{
"category": "external",
"summary": "SUSE Bug 1204096 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204096"
},
{
"category": "external",
"summary": "SUSE Bug 1204097 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204097"
},
{
"category": "external",
"summary": "SUSE Bug 1205075 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1205075"
},
{
"category": "external",
"summary": "SUSE Bug 1208131 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1208131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-15523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15523"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15523",
"url": "https://www.suse.com/security/cve/CVE-2020-15523"
},
{
"category": "external",
"summary": "SUSE Bug 1173745 for CVE-2020-15523",
"url": "https://bugzilla.suse.com/1173745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15523"
},
{
"cve": "CVE-2020-15801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15801"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15801",
"url": "https://www.suse.com/security/cve/CVE-2020-15801"
},
{
"category": "external",
"summary": "SUSE Bug 1174241 for CVE-2020-15801",
"url": "https://bugzilla.suse.com/1174241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-15801"
},
{
"cve": "CVE-2020-8492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8492"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8492",
"url": "https://www.suse.com/security/cve/CVE-2020-8492"
},
{
"category": "external",
"summary": "SUSE Bug 1162367 for CVE-2020-8492",
"url": "https://bugzilla.suse.com/1162367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2021-23336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23336"
}
],
"notes": [
{
"category": "general",
"text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23336",
"url": "https://www.suse.com/security/cve/CVE-2021-23336"
},
{
"category": "external",
"summary": "SUSE Bug 1182179 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182179"
},
{
"category": "external",
"summary": "SUSE Bug 1182379 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182379"
},
{
"category": "external",
"summary": "SUSE Bug 1182433 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3177"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3177",
"url": "https://www.suse.com/security/cve/CVE-2021-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1181126 for CVE-2021-3177",
"url": "https://bugzilla.suse.com/1181126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-3426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3426"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3426",
"url": "https://www.suse.com/security/cve/CVE-2021-3426"
},
{
"category": "external",
"summary": "SUSE Bug 1183374 for CVE-2021-3426",
"url": "https://bugzilla.suse.com/1183374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3426"
},
{
"cve": "CVE-2022-25236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-25236"
}
],
"notes": [
{
"category": "general",
"text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-25236",
"url": "https://www.suse.com/security/cve/CVE-2022-25236"
},
{
"category": "external",
"summary": "SUSE Bug 1196025 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196025"
},
{
"category": "external",
"summary": "SUSE Bug 1196784 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196784"
},
{
"category": "external",
"summary": "SUSE Bug 1197217 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1197217"
},
{
"category": "external",
"summary": "SUSE Bug 1200038 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1200038"
},
{
"category": "external",
"summary": "SUSE Bug 1201735 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1201735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-42919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42919"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42919",
"url": "https://www.suse.com/security/cve/CVE-2022-42919"
},
{
"category": "external",
"summary": "SUSE Bug 1204886 for CVE-2022-42919",
"url": "https://bugzilla.suse.com/1204886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45061"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45061",
"url": "https://www.suse.com/security/cve/CVE-2022-45061"
},
{
"category": "external",
"summary": "SUSE Bug 1205244 for CVE-2022-45061",
"url": "https://bugzilla.suse.com/1205244"
},
{
"category": "external",
"summary": "SUSE Bug 1211488 for CVE-2022-45061",
"url": "https://bugzilla.suse.com/1211488"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2023-0286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0286"
}
],
"notes": [
{
"category": "general",
"text": "There is a type confusion vulnerability relating to X.400 address processing\ninside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but\nthe public structure definition for GENERAL_NAME incorrectly specified the type\nof the x400Address field as ASN1_TYPE. This field is subsequently interpreted by\nthe OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an\nASN1_STRING.\n\nWhen CRL checking is enabled (i.e. the application sets the\nX509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass\narbitrary pointers to a memcmp call, enabling them to read memory contents or\nenact a denial of service. In most cases, the attack requires the attacker to\nprovide both the certificate chain and CRL, neither of which need to have a\nvalid signature. If the attacker only controls one of these inputs, the other\ninput must already contain an X.400 address as a CRL distribution point, which\nis uncommon. As such, this vulnerability is most likely to only affect\napplications which have implemented their own functionality for retrieving CRLs\nover a network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0286",
"url": "https://www.suse.com/security/cve/CVE-2023-0286"
},
{
"category": "external",
"summary": "SUSE Bug 1207533 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1207533"
},
{
"category": "external",
"summary": "SUSE Bug 1207569 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1207569"
},
{
"category": "external",
"summary": "SUSE Bug 1211136 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1211136"
},
{
"category": "external",
"summary": "SUSE Bug 1211503 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1211503"
},
{
"category": "external",
"summary": "SUSE Bug 1213146 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1213146"
},
{
"category": "external",
"summary": "SUSE Bug 1214269 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1214269"
},
{
"category": "external",
"summary": "SUSE Bug 1218477 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1218477"
},
{
"category": "external",
"summary": "SUSE Bug 1218967 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1218967"
},
{
"category": "external",
"summary": "SUSE Bug 1225677 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1225677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-24329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-24329"
}
],
"notes": [
{
"category": "general",
"text": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-24329",
"url": "https://www.suse.com/security/cve/CVE-2023-24329"
},
{
"category": "external",
"summary": "SUSE Bug 1208471 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1208471"
},
{
"category": "external",
"summary": "SUSE Bug 1213553 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213553"
},
{
"category": "external",
"summary": "SUSE Bug 1213554 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213554"
},
{
"category": "external",
"summary": "SUSE Bug 1213839 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213839"
},
{
"category": "external",
"summary": "SUSE Bug 1225672 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1225672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-2650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2650"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Processing some specially crafted ASN.1 object identifiers or\ndata containing them may be very slow.\n\nImpact summary: Applications that use OBJ_obj2txt() directly, or use any of\nthe OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message\nsize limit may experience notable to very long delays when processing those\nmessages, which may lead to a Denial of Service.\n\nAn OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -\nmost of which have no size limit. OBJ_obj2txt() may be used to translate\nan ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL\ntype ASN1_OBJECT) to its canonical numeric text form, which are the\nsub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by\nperiods.\n\nWhen one of the sub-identifiers in the OBJECT IDENTIFIER is very large\n(these are sizes that are seen as absurdly large, taking up tens or hundreds\nof KiBs), the translation to a decimal number in text may take a very long\ntime. The time complexity is O(n^2) with \u0027n\u0027 being the size of the\nsub-identifiers in bytes (*).\n\nWith OpenSSL 3.0, support to fetch cryptographic algorithms using names /\nidentifiers in string form was introduced. This includes using OBJECT\nIDENTIFIERs in canonical numeric text form as identifiers for fetching\nalgorithms.\n\nSuch OBJECT IDENTIFIERs may be received through the ASN.1 structure\nAlgorithmIdentifier, which is commonly used in multiple protocols to specify\nwhat cryptographic algorithm should be used to sign or verify, encrypt or\ndecrypt, or digest passed data.\n\nApplications that call OBJ_obj2txt() directly with untrusted data are\naffected, with any version of OpenSSL. If the use is for the mere purpose\nof display, the severity is considered low.\n\nIn OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,\nCMS, CMP/CRMF or TS. It also impacts anything that processes X.509\ncertificates, including simple things like verifying its signature.\n\nThe impact on TLS is relatively low, because all versions of OpenSSL have a\n100KiB limit on the peer\u0027s certificate chain. Additionally, this only\nimpacts clients, or servers that have explicitly enabled client\nauthentication.\n\nIn OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,\nsuch as X.509 certificates. This is assumed to not happen in such a way\nthat it would cause a Denial of Service, so these versions are considered\nnot affected by this issue in such a way that it would be cause for concern,\nand the severity is therefore considered low.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2650",
"url": "https://www.suse.com/security/cve/CVE-2023-2650"
},
{
"category": "external",
"summary": "SUSE Bug 1211430 for CVE-2023-2650",
"url": "https://bugzilla.suse.com/1211430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-27043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-27043"
}
],
"notes": [
{
"category": "general",
"text": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-27043",
"url": "https://www.suse.com/security/cve/CVE-2023-27043"
},
{
"category": "external",
"summary": "SUSE Bug 1210638 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1210638"
},
{
"category": "external",
"summary": "SUSE Bug 1222537 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1222537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-40217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-40217"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as \"not connected\" and won\u0027t initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-40217",
"url": "https://www.suse.com/security/cve/CVE-2023-40217"
},
{
"category": "external",
"summary": "SUSE Bug 1214692 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1214692"
},
{
"category": "external",
"summary": "SUSE Bug 1217524 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1217524"
},
{
"category": "external",
"summary": "SUSE Bug 1218319 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218319"
},
{
"category": "external",
"summary": "SUSE Bug 1218476 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218476"
},
{
"category": "external",
"summary": "SUSE Bug 1218965 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218965"
},
{
"category": "external",
"summary": "SUSE Bug 1219472 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1219472"
},
{
"category": "external",
"summary": "SUSE Bug 1219713 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1219713"
},
{
"category": "external",
"summary": "SUSE Bug 1221582 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1221582"
},
{
"category": "external",
"summary": "SUSE Bug 1224883 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1224883"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-52425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52425"
}
],
"notes": [
{
"category": "general",
"text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52425",
"url": "https://www.suse.com/security/cve/CVE-2023-52425"
},
{
"category": "external",
"summary": "SUSE Bug 1219559 for CVE-2023-52425",
"url": "https://bugzilla.suse.com/1219559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2024-4030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4030"
}
],
"notes": [
{
"category": "general",
"text": "On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\n\nIf you\u0027re not using Windows or haven\u0027t changed the temporary directory location then you aren\u0027t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\n\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \"700\" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4030",
"url": "https://www.suse.com/security/cve/CVE-2024-4030"
},
{
"category": "external",
"summary": "SUSE Bug 1227152 for CVE-2024-4030",
"url": "https://bugzilla.suse.com/1227152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-4030"
}
]
}
WID-SEC-W-2023-1435
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die Relion-Produktfamilie umfasst Produkte f\u00fcr Schutz, Steuerung, Messung und \u00dcberwachung von Energiesystemen f\u00fcr IEC- und ANSI-Anwendungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Hitachi Energy Relion ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1435 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1435.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1435 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1435"
},
{
"category": "external",
"summary": "ABB Relion REX640 Cyber Security Improvements vom 2023-06-12",
"url": "https://library.e.abb.com/public/1f777da94ee04c6a8108533b46c46971/ABB%20Relion%20REX640%20Cyber%20Security%20Improvements_Rev.A.pdf"
}
],
"source_lang": "en-US",
"title": "Hitachi Energy Relion: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-12T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:52:21.046+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1435",
"initial_release_date": "2023-06-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Energy Relion REX640 FW \u003c 1.0.8",
"product": {
"name": "Hitachi Energy Relion REX640 FW \u003c 1.0.8",
"product_id": "T028062",
"product_identification_helper": {
"cpe": "cpe:/h:abb:relion:rex640_fw__1.0.8"
}
}
},
{
"category": "product_name",
"name": "Hitachi Energy Relion REX640 FW \u003c 1.1.4",
"product": {
"name": "Hitachi Energy Relion REX640 FW \u003c 1.1.4",
"product_id": "T028063",
"product_identification_helper": {
"cpe": "cpe:/h:abb:relion:rex640_fw__1.1.4"
}
}
},
{
"category": "product_name",
"name": "Hitachi Energy Relion REX640 FW \u003c 1.2.1",
"product": {
"name": "Hitachi Energy Relion REX640 FW \u003c 1.2.1",
"product_id": "T028064",
"product_identification_helper": {
"cpe": "cpe:/h:abb:relion:rex640_fw__1.2.1"
}
}
}
],
"category": "product_name",
"name": "Relion"
}
],
"category": "vendor",
"name": "Hitachi Energy"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-2876",
"notes": [
{
"category": "description",
"text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-2876"
},
{
"cve": "CVE-2013-0169",
"notes": [
{
"category": "description",
"text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2013-0169"
},
{
"cve": "CVE-2011-3389",
"notes": [
{
"category": "description",
"text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-1473",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Hitachi Energy Relion. Der Fehler besteht aufgrund einer nicht ordnungsgem\u00e4\u00df funktionierenden TLS-Sitzungsneuaushandlung auf Client-Seite. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2011-1473"
}
]
}
wid-sec-w-2023-1435
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die Relion-Produktfamilie umfasst Produkte f\u00fcr Schutz, Steuerung, Messung und \u00dcberwachung von Energiesystemen f\u00fcr IEC- und ANSI-Anwendungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Hitachi Energy Relion ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1435 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1435.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1435 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1435"
},
{
"category": "external",
"summary": "ABB Relion REX640 Cyber Security Improvements vom 2023-06-12",
"url": "https://library.e.abb.com/public/1f777da94ee04c6a8108533b46c46971/ABB%20Relion%20REX640%20Cyber%20Security%20Improvements_Rev.A.pdf"
}
],
"source_lang": "en-US",
"title": "Hitachi Energy Relion: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-12T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:52:21.046+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1435",
"initial_release_date": "2023-06-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Energy Relion REX640 FW \u003c 1.0.8",
"product": {
"name": "Hitachi Energy Relion REX640 FW \u003c 1.0.8",
"product_id": "T028062",
"product_identification_helper": {
"cpe": "cpe:/h:abb:relion:rex640_fw__1.0.8"
}
}
},
{
"category": "product_name",
"name": "Hitachi Energy Relion REX640 FW \u003c 1.1.4",
"product": {
"name": "Hitachi Energy Relion REX640 FW \u003c 1.1.4",
"product_id": "T028063",
"product_identification_helper": {
"cpe": "cpe:/h:abb:relion:rex640_fw__1.1.4"
}
}
},
{
"category": "product_name",
"name": "Hitachi Energy Relion REX640 FW \u003c 1.2.1",
"product": {
"name": "Hitachi Energy Relion REX640 FW \u003c 1.2.1",
"product_id": "T028064",
"product_identification_helper": {
"cpe": "cpe:/h:abb:relion:rex640_fw__1.2.1"
}
}
}
],
"category": "product_name",
"name": "Relion"
}
],
"category": "vendor",
"name": "Hitachi Energy"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-2876",
"notes": [
{
"category": "description",
"text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-2876"
},
{
"cve": "CVE-2013-0169",
"notes": [
{
"category": "description",
"text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2013-0169"
},
{
"cve": "CVE-2011-3389",
"notes": [
{
"category": "description",
"text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-1473",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Hitachi Energy Relion. Der Fehler besteht aufgrund einer nicht ordnungsgem\u00e4\u00df funktionierenden TLS-Sitzungsneuaushandlung auf Client-Seite. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2011-1473"
}
]
}
gsd-2011-3389
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2011-3389",
"description": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"id": "GSD-2011-3389",
"references": [
"https://www.suse.com/security/cve/CVE-2011-3389.html",
"https://www.debian.org/security/2012/dsa-2398",
"https://www.debian.org/security/2011/dsa-2368",
"https://www.debian.org/security/2011/dsa-2358",
"https://www.debian.org/security/2011/dsa-2356",
"https://access.redhat.com/errata/RHSA-2013:1455",
"https://access.redhat.com/errata/RHSA-2012:0508",
"https://access.redhat.com/errata/RHSA-2012:0343",
"https://access.redhat.com/errata/RHSA-2012:0034",
"https://access.redhat.com/errata/RHSA-2012:0006",
"https://access.redhat.com/errata/RHSA-2011:1384",
"https://access.redhat.com/errata/RHSA-2011:1380",
"https://alas.aws.amazon.com/cve/html/CVE-2011-3389.html",
"https://linux.oracle.com/cve/CVE-2011-3389.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-3389"
],
"details": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"id": "GSD-2011-3389",
"modified": "2023-12-13T01:19:09.516346Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3389",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "74829",
"refsource": "OSVDB",
"url": "http://osvdb.org/74829"
},
{
"name": "http://eprint.iacr.org/2004/111",
"refsource": "MISC",
"url": "http://eprint.iacr.org/2004/111"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635",
"refsource": "MISC",
"url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635"
},
{
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "48692",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48692"
},
{
"name": "HPSBMU02799",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"name": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf",
"refsource": "CONFIRM",
"url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf"
},
{
"name": "SSRT100805",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"name": "55322",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55322"
},
{
"name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5130"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=737506",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"name": "HPSBUX02730",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"name": "SUSE-SU-2012:0602",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"
},
{
"name": "1025997",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025997"
},
{
"name": "TA12-010A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html"
},
{
"name": "APPLE-SA-2011-10-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"name": "SUSE-SU-2012:0114",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
},
{
"name": "49388",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49388"
},
{
"name": "http://ekoparty.org/2011/juliano-rizzo.php",
"refsource": "MISC",
"url": "http://ekoparty.org/2011/juliano-rizzo.php"
},
{
"name": "http://downloads.asterisk.org/pub/security/AST-2016-001.html",
"refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html"
},
{
"name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail",
"refsource": "CONFIRM",
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "55351",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55351"
},
{
"name": "SSRT100710",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"name": "VU#864643",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/864643"
},
{
"name": "APPLE-SA-2013-10-22-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "49778",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49778"
},
{
"name": "DSA-2398",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2398"
},
{
"name": "48948",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48948"
},
{
"name": "http://support.apple.com/kb/HT6150",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6150"
},
{
"name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "http://technet.microsoft.com/security/advisory/2588513",
"refsource": "CONFIRM",
"url": "http://technet.microsoft.com/security/advisory/2588513"
},
{
"name": "openSUSE-SU-2012:0063",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/13155432"
},
{
"name": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx"
},
{
"name": "RHSA-2011:1384",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1151/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1151/"
},
{
"name": "openSUSE-SU-2012:0030",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/13154861"
},
{
"name": "http://eprint.iacr.org/2006/136",
"refsource": "MISC",
"url": "http://eprint.iacr.org/2006/136"
},
{
"name": "48915",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48915"
},
{
"name": "GLSA-201203-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
},
{
"name": "SSRT100740",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"name": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html",
"refsource": "MISC",
"url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html"
},
{
"name": "48256",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48256"
},
{
"name": "APPLE-SA-2012-09-19-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
},
{
"name": "1026103",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026103"
},
{
"name": "http://support.apple.com/kb/HT4999",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4999"
},
{
"name": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html",
"refsource": "CONFIRM",
"url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html"
},
{
"name": "http://support.apple.com/kb/HT5501",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5501"
},
{
"name": "http://www.insecure.cl/Beast-SSL.rar",
"refsource": "MISC",
"url": "http://www.insecure.cl/Beast-SSL.rar"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02"
},
{
"name": "http://support.apple.com/kb/HT5001",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5001"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/1160/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/1160/"
},
{
"name": "http://curl.haxx.se/docs/adv_20120124B.html",
"refsource": "CONFIRM",
"url": "http://curl.haxx.se/docs/adv_20120124B.html"
},
{
"name": "http://www.opera.com/support/kb/view/1004/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/support/kb/view/1004/"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"name": "1026704",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026704"
},
{
"name": "APPLE-SA-2012-07-25-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html"
},
{
"name": "HPSBMU02742",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"name": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue",
"refsource": "CONFIRM",
"url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue"
},
{
"name": "RHSA-2012:0508",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html"
},
{
"name": "45791",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45791"
},
{
"name": "1029190",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029190"
},
{
"name": "MDVSA-2012:058",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058"
},
{
"name": "47998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47998"
},
{
"name": "SSRT100867",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"name": "49198",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49198"
},
{
"name": "RHSA-2012:0006",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html"
},
{
"name": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/",
"refsource": "CONFIRM",
"url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1160/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1160/"
},
{
"name": "SUSE-SU-2012:0122",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html"
},
{
"name": "HPSBUX02777",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"name": "oval:org.mitre.oval:def:14752",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/1151/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/unix/1151/"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/1151/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/1151/"
},
{
"name": "MS12-006",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006"
},
{
"name": "HPSBUX02760",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/1160/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/unix/1160/"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"name": "http://support.apple.com/kb/HT5281",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "SSRT100854",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"name": "APPLE-SA-2011-10-12-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=719047",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=719047"
},
{
"name": "HPSBMU02900",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"name": "http://vnhacker.blogspot.com/2011/09/beast.html",
"refsource": "MISC",
"url": "http://vnhacker.blogspot.com/2011/09/beast.html"
},
{
"name": "USN-1263-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1263-1"
},
{
"name": "APPLE-SA-2012-05-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "55350",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55350"
},
{
"name": "HPSBMU02797",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"name": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
},
{
"name": "openSUSE-SU-2020:0086",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_rf68xr_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.2.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_rf68xr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_rf615r_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.2.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_rf615r:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.23.1",
"versionStartIncluding": "7.10.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-3389"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.opera.com/docs/changelogs/unix/1151/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/unix/1151/"
},
{
"name": "49388",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/49388"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1151/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/windows/1151/"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/1151/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/mac/1151/"
},
{
"name": "74829",
"refsource": "OSVDB",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/74829"
},
{
"name": "45791",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/45791"
},
{
"name": "1025997",
"refsource": "SECTRACK",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1025997"
},
{
"name": "http://eprint.iacr.org/2004/111",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "http://eprint.iacr.org/2004/111"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=737506",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"name": "http://ekoparty.org/2011/juliano-rizzo.php",
"refsource": "MISC",
"tags": [
"Broken Link"
],
"url": "http://ekoparty.org/2011/juliano-rizzo.php"
},
{
"name": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=719047",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=719047"
},
{
"name": "http://www.insecure.cl/Beast-SSL.rar",
"refsource": "MISC",
"tags": [
"Broken Link",
"Patch"
],
"url": "http://www.insecure.cl/Beast-SSL.rar"
},
{
"name": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html",
"refsource": "MISC",
"tags": [
"Broken Link"
],
"url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html"
},
{
"name": "http://eprint.iacr.org/2006/136",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "http://eprint.iacr.org/2006/136"
},
{
"name": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635"
},
{
"name": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue"
},
{
"name": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/"
},
{
"name": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx"
},
{
"name": "http://technet.microsoft.com/security/advisory/2588513",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://technet.microsoft.com/security/advisory/2588513"
},
{
"name": "http://support.apple.com/kb/HT4999",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT4999"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"name": "http://support.apple.com/kb/HT5001",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5001"
},
{
"name": "APPLE-SA-2011-10-12-1",
"refsource": "APPLE",
"tags": [
"Broken Link"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"name": "APPLE-SA-2011-10-12-2",
"refsource": "APPLE",
"tags": [
"Broken Link"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html"
},
{
"name": "1026103",
"refsource": "SECTRACK",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1026103"
},
{
"name": "49778",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/49778"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx"
},
{
"name": "RHSA-2011:1384",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html"
},
{
"name": "http://vnhacker.blogspot.com/2011/09/beast.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "http://vnhacker.blogspot.com/2011/09/beast.html"
},
{
"name": "VU#864643",
"refsource": "CERT-VN",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/864643"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html",
"refsource": "CONFIRM",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"name": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1160/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/windows/1160/"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/1160/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/mac/1160/"
},
{
"name": "http://www.opera.com/support/kb/view/1004/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "http://www.opera.com/support/kb/view/1004/"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/1160/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/unix/1160/"
},
{
"name": "RHSA-2012:0006",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html"
},
{
"name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5130"
},
{
"name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "SSRT100740",
"refsource": "HP",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"name": "http://support.apple.com/kb/HT5281",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "APPLE-SA-2012-05-09-1",
"refsource": "APPLE",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "APPLE-SA-2012-07-25-2",
"refsource": "APPLE",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT5501",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5501"
},
{
"name": "APPLE-SA-2012-09-19-2",
"refsource": "APPLE",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
},
{
"name": "49198",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/49198"
},
{
"name": "SUSE-SU-2012:0122",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html"
},
{
"name": "openSUSE-SU-2012:0063",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "https://hermes.opensuse.org/messages/13155432"
},
{
"name": "openSUSE-SU-2012:0030",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "https://hermes.opensuse.org/messages/13154861"
},
{
"name": "SUSE-SU-2012:0114",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
},
{
"name": "HPSBUX02730",
"refsource": "HP",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"name": "48692",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48692"
},
{
"name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"name": "48948",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48948"
},
{
"name": "48915",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48915"
},
{
"name": "TA12-010A",
"refsource": "CERT",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html"
},
{
"name": "HPSBMU02900",
"refsource": "HP",
"tags": [
"Broken Link"
],
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"name": "55351",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/55351"
},
{
"name": "55322",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/55322"
},
{
"name": "55350",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/55350"
},
{
"name": "1029190",
"refsource": "SECTRACK",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1029190"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"tags": [
"Broken Link"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "APPLE-SA-2013-10-22-3",
"refsource": "APPLE",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"name": "USN-1263-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1263-1"
},
{
"name": "http://support.apple.com/kb/HT6150",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT6150"
},
{
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "http://downloads.asterisk.org/pub/security/AST-2016-001.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html"
},
{
"name": "SSRT100867",
"refsource": "HP",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"name": "SSRT100805",
"refsource": "HP",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"name": "HPSBUX02777",
"refsource": "HP",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"name": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf"
},
{
"name": "oval:org.mitre.oval:def:14752",
"refsource": "OVAL",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752"
},
{
"name": "HPSBMU02799",
"refsource": "HP",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"name": "MDVSA-2012:058",
"refsource": "MANDRIVA",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058"
},
{
"name": "RHSA-2012:0508",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html"
},
{
"name": "SUSE-SU-2012:0602",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"
},
{
"name": "GLSA-201203-02",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
},
{
"name": "48256",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48256"
},
{
"name": "1026704",
"refsource": "SECTRACK",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1026704"
},
{
"name": "47998",
"refsource": "SECUNIA",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/47998"
},
{
"name": "DSA-2398",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2012/dsa-2398"
},
{
"name": "http://curl.haxx.se/docs/adv_20120124B.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20120124B.html"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02"
},
{
"name": "MS12-006",
"refsource": "MS",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
},
{
"name": "openSUSE-SU-2020:0086",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2022-11-29T15:56Z",
"publishedDate": "2011-09-06T19:55Z"
}
}
}
var-201109-0130
Vulnerability from variot
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack. A vulnerability in the specification of the SSL 3.0 and TLS 1.0 protocols could allow an attacker to decrypt encrypted traffic. SSL Protocol and TLS The protocol includes CBC There are vulnerabilities that are subject to selective plaintext attacks in mode. SSL Protocol and TLS Protocol is CBC Initialization vector when operating in mode (IV) There is a problem in the determination method, and there is a vulnerability that is subject to selective plaintext attacks. Attack methods using this vulnerability have been released.Encrypted communication is a man-in-the-middle attack (man-in-the-middle attack) If they are intercepted by you, their content may be decrypted. This will result in a false sense of security, and potentially result in the disclosure of sensitive information. ----------------------------------------------------------------------
SC World Congress, New York, USA, 16 November 2011 Visit the Secunia booth (#203) and discover how you can improve your handling of third party programs:
http://secunia.com/resources/events/sc_2011/
TITLE: IBM Lotus Domino SSL/TLS Initialization Vector Selection Weakness
SECUNIA ADVISORY ID: SA46791
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46791/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46791
RELEASE DATE: 2011-11-11
DISCUSS ADVISORY: http://secunia.com/advisories/46791/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/46791/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46791
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A weakness has been reported in IBM Lotus Domino, which can be exploited by malicious people to disclose potentially sensitive information and hijack a user's session.
For more information: SA46168
The vulnerability is reported in versions 8.0, 8.5, 8.5.1, 8.5.2, and 8.5.3.
SOLUTION: As a workaround enable RC4 encryption (please see the vendor's advisory for details).
PROVIDED AND/OR DISCOVERED BY: Thai Duong and Juliano Rizzo
ORIGINAL ADVISORY: IBM: http://www.ibm.com/support/docview.wss?uid=swg21568229
IBM ISS X-Force: http://xforce.iss.net/xforce/xfdb/70069
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT (CVE-2011-3548).
IcedTea6 prior to 1.10.4 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (CVE-2011-3551).
IcedTea6 prior to 1.10.4 allows remote attackers to affect integrity via unknown vectors related to Networking (CVE-2011-3552).
IcedTea6 prior to 1.10.4 allows remote authenticated users to affect confidentiality, related to JAXWS (CVE-2011-3553).
IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting (CVE-2011-3544).
IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization (CVE-2011-3521).
IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors (CVE-2011-3554).
IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot (CVE-2011-3558).
IcedTea6 prior to 1.10.4 allows remote attackers to affect confidentiality, integrity, and availability, related to RMI (CVE-2011-3556).
IcedTea6 prior to 1.10.4 allows remote attackers to affect confidentiality, integrity, and availability, related to RMI (CVE-2011-3557).
IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE (CVE-2011-3560).
Deepak Bhole discovered a flaw in the Same Origin Policy (SOP) implementation in the IcedTea project Web browser plugin. A malicious applet could use this flaw to bypass SOP protection and open connections to any sub-domain of the second-level domain of the applet's origin, as well as any sub-domain of the domain that is the suffix of the origin second-level domain. For example, IcedTea-Web plugin allowed applet from some.host.example.com to connect to other.host.example.com, www.example.com, and example.com, as well as www.ample.com or ample.com. (CVE-2011-3377). The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFOvSWxmqjQ0CJFipgRAnk1AKDUddZYCqwkfhoUpLxEL0BT3mDf0ACfbuTI aaF2JGTyfceBABs92un/yVA= =yPsD -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
ESA-2012-029: RSA BSAFE\xae SSL-C Multiple Vulnerabilities
EMC Identifier: ESA-2012-029
CVE Identifier: CVE-2011-3389, CVE-2012-2110, CVE-2012-2131
Severity Rating: See below for scores for individual issues
Affected Products:
All versions of RSA BSAFE SSL-C prior to 2.8.6, all platforms
Unaffected Products:
RSA BSAFE SSL-C 2.8.6
Summary:
RSA BSAFE SSL-C 2.8.6 contains fixes designed to [prevent] BEAST attacks (CVE-2011-3389) and buffer overflow vulnerability (CVE-2012-2110/CVE-2012-2131).
Details:
This release includes fixes for the following vulnerabilities:
1.BEAST (Browser Exploit Against SSL/TLS) attack (CVE-2011-3389
There is a known vulnerability in SSLv3 and TLS v1.0 to do with how the Initialization Vector (IV) is generated. For symmetric key algorithms in CBC mode, the IV for the first record is generated using keys and secrets set during the SSL or TLS handshake. All subsequent records are encrypted using the ciphertext block from the previous record as the IV. With symmetric key encryption in CBC mode, plain text encrypted with the same IV and key generates the same cipher text, which is why having a variable IV is important. The BEAST exploit uses this SSLv3 and TLS v1.0 vulnerability by allowing an attacker to observe the last ciphertext block, which is the IV, then replace this with an IV of their choice, inject some of their own plain text data, and when this new IV is used to encrypt the data, the attacker can guess the plain text data one byte at a time. CVSSv2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 2.Buffer overflow vulnerability (CVE-2012-2110/CVE-2012-2131) SSL-C contains code that does not properly interpret integer data, which could allow buffer overflow attacks using crafted DER (Distinguished Encoding Rules) data, such as in X.509 certificate or an RSA asymmetric key. CVSSv2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Recommendation:
For BEAST (Browser Exploit Against SSL/TLS) attack: The best way to help prevent this attack is to use TLS v1.1. The vulnerability to do with IV generation was fixed in TLS v1.1 (released in 2006) so implementations using only TLS v1.1 are engineered to be secure against the BEAST exploit. However, support for this higher level protocol is limited to a smaller number of applications, so supporting only TLS v1.1 might cause interoperability issues.
A second solution is to limit the negotiated cipher suites to exclude those that do not require symmetric key algorithms in CBC mode. However, this substantially restricts the number of cipher suites that can be negotiated. That is, only cipher suites with NULL encryption or cipher suites with streaming encryption algorithms (the RC4 algorithm) could be negotiated.
In RSA BSAFE SSL-C 2.8.6, the BEAST exploit is prevented by introducing some unknown data into the encryption scheme, prior to the attackers inserted plain text data. This is done as follows:
1.The first plain text block to be encrypted is split into two blocks. The first block contains the first byte of the data, the second block contains the rest. 2.A MAC is generated from the one byte of data, the MAC key, and an increasing counter. This MAC is included in the first block. 3.The one byte of data, along with the MAC, is encrypted and becomes the IV for the next block. Because the IV is now essentially random data, it is impossible for an attacker to predict it and replace it with one of their own. To manage this first block splitting in RSA BSAFE SSL-C 2.8.6, either for an SSL context or SSL object, call R_SSL_CTX_set_options() or R_SSL_set_options() respectively, with the SSL_OP_SPLIT_FIRST_FRAGMENT identifier, this option is enabled by default.
For more information about these functions and identifiers, see the RSA BSAFE SSL-C 2.8.6 API Reference Guide.
For Buffer Overflow vulnerability: RSA strongly recommends that RSA BSAFE SSL-C customers upgrade to RSA BSAFE SSL-C 2.8.6 that contains upgrades designed to resolve this issue. RSA recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
Obtaining Documentation:
To obtain RSA documentation, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose documentation you want to obtain. Scroll to the section for the product version that you want and click the set link.
Obtaining More Information:
For more information about RSA BSAFE, visit the RSA web site at http://www.rsa.com/node.aspx?id=1204.
Getting Support and Service:
For customers with current maintenance contracts, contact your local RSA Customer Support center with any additional questions regarding this RSA SecurCare Note. For contact telephone numbers or e-mail addresses, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help & Contact, and then click the Contact Us - Phone tab or the Contact Us - Email tab.
General Customer Support Information:
http://www.rsa.com/node.aspx?id=1264
RSA SecurCare Online:
https://knowledge.rsasecurity.com
EOPS Policy:
RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the link below for additional details. http://www.rsa.com/node.aspx?id=2575
SecurCare Online Security Advisories
RSA, The Security Division of EMC, distributes SCOL Security Advisories in order to bring to the attention of users of the affected RSA products important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. RSA disclaim all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall RSA or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
About RSA SecurCare Notes & Security Advisories Subscription
RSA SecurCare Notes & Security Advisories are targeted e-mail messages that RSA sends you based on the RSA product family you currently use. If you\x92d like to stop receiving RSA SecurCare Notes & Security Advisories, or if you\x92d like to change which RSA product family Notes & Security Advisories you currently receive, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3. Following the instructions on the page, remove the check mark next to the RSA product family whose Notes & Security Advisories you no longer want to receive. Click the Submit button to save your selection.
Details: Unisphere Central requires an update to address various security vulnerabilities:
- Unvalidated Redirect Vulnerability (CVE-2015-0512)
A potential vulnerability in Unisphere Central may allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks. The attacker can specify the location of the arbitrary site in the unvalidated parameter of a crafted URL. If this URL is accessed, the browser is redirected to the arbitrary site specified in the parameter.
CVSSv2 Base Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
- Multiple Embedded Component Vulnerabilities
The following vulnerabilities affecting multiple embedded components were addressed:
\x95 PostgreSQL (CVE-2013-1899, CVE-2013-1900, CVE-2013-1901, CVE-2013-1902) \x95 Apache Tomcat HTTP Digest Access Bypass (CVE-2012-5885) \x95 SSL3.0/TLS1.0 Weak CBC Mode Vulnerability (CVE-2011-3389) \x95 SUSE Kernel Updates (CVE-2013-1767, CVE-2012-2137, CVE-2012-6548, CVE-2013-1797, CVE-2013-0231,CVE-2013-1774, CVE-2013-1848, CVE-2013-0311, CVE-2013-2634, CVE-2013-0268, CVE-2013-0913, CVE-2013-1772, CVE-2013-0216, CVE-2013-1792, CVE-2012-6549, CVE-2013-2635, CVE-2013-0914, CVE-2013-1796, CVE-2013-0160, CVE-2013-1860, CVE-2013-0349, CVE-2013-1798) \x95 Libgcrypt (CVE-2013-4242) \x95 cURL/libcURL Multiple Vulnerabilities (CVE-2014-0138, CVE-2014-0139, CVE-2014-0015, CVE-2014-3613, CVE-2014-3620) \x95 OpenSSL Multiple Vulnerabilities (CVE-2010-5298, CVE-2014-0076, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470, CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139, CVE-2014-3513, CVE-2014-3567, CVE-2014-3568, CVE-2014-3566) \x95 GNU Privacy Guard (GPG2) Update (CVE-2012-6085) \x95 Java Runtime Environment (CVE-2014-2403, CVE-2014-0446, CVE-2014-0457, CVE-2014-0453, CVE-2014-2412, CVE-2014-2398, CVE-2014-0458, CVE-2014-2397, CVE-2014-0460, CVE-2014-0429, CVE-2014-2428, CVE-2014-2423, CVE-2014-2420, CVE-2014-0448, CVE-2014-0459, CVE-2014-2427, CVE-2014-2414, CVE-2014-0461, CVE-2014-0454, CVE-2014-2422, CVE-2014-0464, CVE-2014-2401, CVE-2014-0456, CVE-2014-0455, CVE-2014-0451, CVE-2014-0449, CVE-2014-0432, CVE-2014-0463, CVE-2014-2410, CVE-2014-2413, CVE-2014-2421, CVE-2014-2409, CVE-2014-2402, CVE-2014-0452, CVE-2014-4220, CVE-2014-2490, CVE-2014-4266, CVE-2014-4219, CVE-2014-2483, CVE-2014-4263, CVE-2014-4264, CVE-2014-4268, CVE-2014-4252, CVE-2014-4223, CVE-2014-4247, CVE-2014-4218, CVE-2014-4221, CVE-2014-4262, CVE-2014-4227, CVE-2014-4208, CVE-2014-4209, CVE-2014-4265, CVE-2014-4244, CVE-2014-4216) \x95 OpenSSH Denial of Service (CVE-2010-5107) \x95 Network Security Services (NSS) Update (CVE-2014-1545, CVE-2014-1541, CVE-2014-1534, CVE-2014-1533, CVE-2014-1536, CVE-2014-1537, CVE-2014-1538) \x95 Xorg-X11 Update (CVE-2013-2005, CVE-2013-2002) \x95 GnuTLS SSL Verification Vulnerability (CVE-2014-0092) \x95 Pango Security Update (CVE-2011-0020, CVE-2011-0064) \x95 D-Bus Denial of Service (CVE-2014-3638,CVE-2014-3639) \x95 Perl Denial of Service (CVE-2014-4330) CVSSv2 Base Score: Refer to NVD (http://nvd.nist.gov) for individual scores for each CVE listed above
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the NVD database\x92s search utility at http://web.nvd.nist.gov/view/vuln/search
Resolution: The following Unisphere Central release contains resolutions to the above issues: \x95 Unisphere Central version 4.0.
EMC strongly recommends all customers upgrade at the earliest opportunity. Contact EMC Unisphere Central customer support to download the required upgrades.
Link to remedies: Registered EMC Online Support customers can download patches and software from support.emc.com at: https://support.emc.com/products/28224_Unisphere-Central
If you have any questions, please contact EMC Support.
Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. A work-around has been added to mitigate the problem (CVE-2011-3389).
curl is vulnerable to a data injection attack for certain protocols through control characters embedded or percent-encoded in URLs (CVE-2012-0036).
Problem Description:
Multiple vulnerabilities has been discovered and corrected in python:
The _ssl module would always disable the CBC IV attack countermeasure (CVE-2011-3389).
A race condition was found in the way the Python distutils module set file permissions during the creation of the .pypirc file. If a local user had access to the home directory of another user who is running distutils, they could use this flaw to gain access to that user's .pypirc file, which can contain usernames and passwords for code repositories (CVE-2011-4944).
A flaw was found in the way the Python SimpleXMLRPCServer module handled clients disconnecting prematurely.
Hash table collisions CPU usage DoS for the embedded copy of expat (CVE-2012-0876).
A denial of service flaw was found in the implementation of associative arrays (dictionaries) in Python. An attacker able to supply a large number of inputs to a Python application (such as HTTP POST request parameters sent to a web application) that are used as keys when inserting data into an array could trigger multiple hash function collisions, making array operations take an excessive amount of CPU time. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions (CVE-2012-1150). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: java-1.6.0-openjdk security update Advisory ID: RHSA-2011:1380-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1380.html Issue date: 2011-10-18 CVE Names: CVE-2011-3389 CVE-2011-3521 CVE-2011-3544 CVE-2011-3547 CVE-2011-3548 CVE-2011-3551 CVE-2011-3552 CVE-2011-3553 CVE-2011-3554 CVE-2011-3556 CVE-2011-3557 CVE-2011-3558 CVE-2011-3560 =====================================================================
- Summary:
Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit.
A flaw was found in the Java RMI (Remote Method Invocation) registry implementation. A remote RMI client could use this flaw to execute arbitrary code on the RMI server running the registry. (CVE-2011-3556)
A flaw was found in the Java RMI registry implementation. A remote RMI client could use this flaw to execute code on the RMI server with unrestricted privileges. (CVE-2011-3557)
A flaw was found in the IIOP (Internet Inter-Orb Protocol) deserialization code. An untrusted Java application or applet running in a sandbox could use this flaw to bypass sandbox restrictions by deserializing specially-crafted input. (CVE-2011-3521)
It was found that the Java ScriptingEngine did not properly restrict the privileges of sandboxed applications. An untrusted Java application or applet running in a sandbox could use this flaw to bypass sandbox restrictions. (CVE-2011-3544)
A flaw was found in the AWTKeyStroke implementation. An untrusted Java application or applet running in a sandbox could use this flaw to bypass sandbox restrictions. (CVE-2011-3548)
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the Java2D code used to perform transformations of graphic shapes and images. An untrusted Java application or applet running in a sandbox could use this flaw to bypass sandbox restrictions. (CVE-2011-3551)
An insufficient error checking flaw was found in the unpacker for JAR files in pack200 format. A specially-crafted JAR file could use this flaw to crash the Java Virtual Machine (JVM) or, possibly, execute arbitrary code with JVM privileges. (CVE-2011-3554)
It was found that HttpsURLConnection did not perform SecurityManager checks in the setSSLSocketFactory method. An untrusted Java application or applet running in a sandbox could use this flaw to bypass connection restrictions defined in the policy. An attacker able to perform a chosen plain text attack against a connection mixing trusted and untrusted data could use this flaw to recover portions of the trusted data sent over the connection. (CVE-2011-3389)
Note: This update mitigates the CVE-2011-3389 issue by splitting the first application data record byte to a separate SSL/TLS protocol record. This mitigation may cause compatibility issues with some SSL/TLS implementations and can be disabled using the jsse.enableCBCProtection boolean property. This can be done on the command line by appending the flag "-Djsse.enableCBCProtection=false" to the java command.
An information leak flaw was found in the InputStream.skip implementation. An untrusted Java application or applet could possibly use this flaw to obtain bytes skipped by other threads. (CVE-2011-3547)
A flaw was found in the Java HotSpot virtual machine. An untrusted Java application or applet could use this flaw to disclose portions of the VM memory, or cause it to crash. (CVE-2011-3558)
The Java API for XML Web Services (JAX-WS) implementation in OpenJDK was configured to include the stack trace in error messages sent to clients. A remote client could possibly use this flaw to obtain sensitive information. (CVE-2011-3553)
It was found that Java applications running with SecurityManager restrictions were allowed to use too many UDP sockets by default. If multiple instances of a malicious application were started at the same time, they could exhaust all available UDP sockets on the system. (CVE-2011-3552)
This erratum also upgrades the OpenJDK package to IcedTea6 1.9.10. Refer to the NEWS file, linked to in the References, for further information.
All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
- Bugs fixed (http://bugzilla.redhat.com/):
737506 - CVE-2011-3389 HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) 745379 - CVE-2011-3560 OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) 745387 - CVE-2011-3547 OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) 745391 - CVE-2011-3551 OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) 745397 - CVE-2011-3552 OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) 745399 - CVE-2011-3544 OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) 745442 - CVE-2011-3521 OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) 745447 - CVE-2011-3554 OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) 745459 - CVE-2011-3556 OpenJDK: RMI DGC server remote code execution (RMI, 7077466) 745464 - CVE-2011-3557 OpenJDK: RMI registry privileged code execution (RMI, 7083012) 745473 - CVE-2011-3548 OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) 745476 - CVE-2011-3553 OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) 745492 - CVE-2011-3558 OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2011-3389.html https://www.redhat.com/security/data/cve/CVE-2011-3521.html https://www.redhat.com/security/data/cve/CVE-2011-3544.html https://www.redhat.com/security/data/cve/CVE-2011-3547.html https://www.redhat.com/security/data/cve/CVE-2011-3548.html https://www.redhat.com/security/data/cve/CVE-2011-3551.html https://www.redhat.com/security/data/cve/CVE-2011-3552.html https://www.redhat.com/security/data/cve/CVE-2011-3553.html https://www.redhat.com/security/data/cve/CVE-2011-3554.html https://www.redhat.com/security/data/cve/CVE-2011-3556.html https://www.redhat.com/security/data/cve/CVE-2011-3557.html https://www.redhat.com/security/data/cve/CVE-2011-3558.html https://www.redhat.com/security/data/cve/CVE-2011-3560.html https://access.redhat.com/security/updates/classification/#critical http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFOngvzXlSAg2UNWIIRArb8AKCaS923HYBco1E2eOOedT1aefjmyACgherU 1E1DMZpv3ExBmKhD4Emi2no= =sMXo -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201109-0130",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "web server",
"scope": "eq",
"trust": 1.8,
"vendor": "hitachi",
"version": "02-03"
},
{
"model": "web server 02-04-/a",
"scope": null,
"trust": 1.5,
"vendor": "hitachi",
"version": null
},
{
"model": "web server",
"scope": "eq",
"trust": 1.2,
"vendor": "hitachi",
"version": "02-01"
},
{
"model": "web server",
"scope": "eq",
"trust": 1.2,
"vendor": "hitachi",
"version": "02-02"
},
{
"model": "esx",
"scope": "eq",
"trust": 1.1,
"vendor": "vmware",
"version": "4.0"
},
{
"model": "esx",
"scope": "eq",
"trust": 1.1,
"vendor": "vmware",
"version": "4.1"
},
{
"model": "esx",
"scope": "eq",
"trust": 1.1,
"vendor": "vmware",
"version": "3.5"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "11.04"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "curl",
"scope": "gte",
"trust": 1.0,
"vendor": "haxx",
"version": "7.10.6"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "simatic rf615r",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.2.1"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "10.04"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "firefox",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 1.0,
"vendor": "google",
"version": null
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "internet explorer",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "10.10"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "11.10"
},
{
"model": "curl",
"scope": "lte",
"trust": 1.0,
"vendor": "haxx",
"version": "7.23.1"
},
{
"model": "browser",
"scope": "eq",
"trust": 1.0,
"vendor": "opera",
"version": null
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.2"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "5.0"
},
{
"model": "simatic rf68xr",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.2.1"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.2"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "6.0"
},
{
"model": "windows",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "jre 17",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "sdk 08",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "web server 01-02-/b",
"scope": null,
"trust": 0.9,
"vendor": "hitachi",
"version": null
},
{
"model": "ucosminexus developer",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "jre 1.4.2 30",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.5.0 16",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 05",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "sdk 10",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jdk 14",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jre",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "sdk 1.4.2 25",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "ucosminexus client",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "jre 1.4.2 25",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 06",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jre 01",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.1"
},
{
"model": "jre 05",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jdk 1.6.0 03",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk 1.4.2 11",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 10",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "ucosminexus application server-r",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "sdk 03",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.1"
},
{
"model": "jre 01",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jre 1.5.0 11",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.4.2 12",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 09",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "sdk 24",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jre 02",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jre 07",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jre 1.4.2 22",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jre 1.6.0 23",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "sdk 1.4.2 27",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk 15",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "sdk 07",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jdk 1.5.0 25",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 07",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jdk 1.5.0 29",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 03",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.1"
},
{
"model": "jre 1.6.0 11",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk 02",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.1"
},
{
"model": "jre 01",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jre 04",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jdk",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jre 1.5.0 17",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.4.2 17",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 24",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jre 1.5.0 27",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "ucosminexus client",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "sdk 1.4.2 30",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.6.0 03",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 01",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jre 1.6.0 26",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "sdk 06",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jre 1.4.2 31",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 08",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jdk 10",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jre 1.4.2 13",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 02",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jdk 1.5.0 23",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 04",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jre 05",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jdk 1.5.0 26",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.7"
},
{
"model": "sdk 1.4.2 16",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.5.0 29",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "ucosminexus service platform",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "ucosminexus service architect",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "ucosminexus service architect",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "jdk 1.5.0 31",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 16",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jre 1.5.0 20",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.5.0 32",
"scope": "ne",
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.5.0 30",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 18",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jdk 11",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "sdk .0 03",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4"
},
{
"model": "jre 1.4.2 11",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 0 10",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jre 1.5.0 10",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.6.0 24",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "jdk 1.5.0 27",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 03",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "sdk 1.4.2 29",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 02",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.1"
},
{
"model": "sdk 1.4.2 14",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.5.0 14",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.4.2 20",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.5.0 24",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "web server 01-02-/c",
"scope": null,
"trust": 0.9,
"vendor": "hitachi",
"version": null
},
{
"model": "jre 1.5.0 25",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.6.0 24",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "jdk .0 05",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jre 06",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jre 1.5.0 28",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "ucosminexus operator for service platform",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "jdk 1.5.0 13",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.4.2 16",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk 1.4.2 17",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.6.0 15",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.1"
},
{
"model": "jre 1.6.0 21",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk 1.4.2 33",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 15",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "sdk 1.4.2 31",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.6.0 28",
"scope": "ne",
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "jre 10",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jre 1.6.0 18",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.1"
},
{
"model": "jre 1.6.0 22",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "jre 1.5.0 31",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk .0 4",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4"
},
{
"model": "sdk 1.4.2 28",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.6.0 21",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.6.0 27",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "jdk 1.6.0 15",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk .0 02",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4"
},
{
"model": "sdk 1.4.2 12",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.4.2 18",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.4.2 14",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "ucosminexus application server-r",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "jre 1.6.0 02",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "ucosminexus developer",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "jre",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jdk 1.5.0 28",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 06",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jre 1.4.2 15",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 15",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "sdk 1.4.2 26",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.6.0 28",
"scope": "ne",
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "jre 1.4.2 29",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk 01",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.1"
},
{
"model": "jdk 17",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "sdk 09",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jre 13",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "sdk",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "ucosminexus primary server base",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "ucosminexus primary server base",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "jre 1.4.2 32",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.5.0 26",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.4.2 33",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.6.0 26",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "jre 1.5.0 30",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.5.0 32",
"scope": "ne",
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk 1.4.2 18",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 05",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "ucosminexus operator for service platform",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "jdk 17",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jdk 18",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "sdk 1.4.2 22",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk",
"scope": "eq",
"trust": 0.9,
"vendor": "oracle",
"version": "1.7"
},
{
"model": "jdk 1.6.0 02",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk 04",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jre 1.6.0 01",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 12",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jdk 07",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "sdk 05",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "web server 01-02-/a",
"scope": null,
"trust": 0.9,
"vendor": "hitachi",
"version": null
},
{
"model": "jdk 14",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jre 02",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "sdk 03",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jre 03",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "sdk 1.4.2 19",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.5.0 12",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "sdk",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.4"
},
{
"model": "jdk 13",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jre 1.5.0 13",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.6.0 25",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "sdk 1.4.2 32",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 22",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jre 1.4.2 19",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.6.0 23",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "sdk 1.4.2 20",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.6.0 20",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.6.0 27",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "jdk 04",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jre 04",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jre 1.6.0 19",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.5.0 20",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.5.0 23",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.6.0 22",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "sdk 1.4.2 13",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 06",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.6"
},
{
"model": "jre 1.6.0 25",
"scope": null,
"trust": 0.9,
"vendor": "oracle",
"version": null
},
{
"model": "jdk 1.6.0 18",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.6.0 19",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.6.0 14",
"scope": null,
"trust": 0.9,
"vendor": "sun",
"version": null
},
{
"model": "jre 22",
"scope": "eq",
"trust": 0.9,
"vendor": "sun",
"version": "1.5"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "google",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "microsoft",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "mozilla",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "opera",
"version": null
},
{
"model": "cosminexus studio",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "st ard edition version 4"
},
{
"model": "ucosminexus operator",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "none"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.7 to v10.7.4 (ruby)"
},
{
"model": "cosminexus studio",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 5"
},
{
"model": "ucosminexus client",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "none"
},
{
"model": "ucosminexus developer",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "st ard"
},
{
"model": "vcenter",
"scope": "eq",
"trust": 0.8,
"vendor": "vmware",
"version": "5.0 (windows)"
},
{
"model": "vcenter",
"scope": "eq",
"trust": 0.8,
"vendor": "vmware",
"version": "4.1 (windows)"
},
{
"model": "firefox",
"scope": null,
"trust": 0.8,
"vendor": "mozilla",
"version": null
},
{
"model": "cosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "enterprise version 6"
},
{
"model": "ucosminexus operator",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "for service platform"
},
{
"model": "iplanet web proxy server",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "4.0"
},
{
"model": "windows 7",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(x64) sp1 before"
},
{
"model": "ucosminexus primary server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "base(64)"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.7 to v10.7.3 (curl)"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "3.0 to 4.3.5 (iphone 3gs iphone 4)"
},
{
"model": "ruggedcom win5100",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "all versions"
},
{
"model": "secureware/pki application development kit",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "v2.1"
},
{
"model": "cosminexus primary server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "base version 6"
},
{
"model": "ucosminexus portal framework",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "entry set"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.7.2 (java)"
},
{
"model": "windows xp",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "sp3 sp3"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.9"
},
{
"model": "windows vista",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(x64) sp2"
},
{
"model": "ucosminexus service",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "platform"
},
{
"model": "ucosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "smart edition"
},
{
"model": "windows server 2003",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "sp2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.8.5 (secure transport)"
},
{
"model": "tuning manager",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "software"
},
{
"model": "ucosminexus developer",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "professional for plug-in"
},
{
"model": "web server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "none"
},
{
"model": "opera",
"scope": null,
"trust": 0.8,
"vendor": "opera asa",
"version": null
},
{
"model": "database",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "11.2.0.3"
},
{
"model": "vcenter",
"scope": "eq",
"trust": 0.8,
"vendor": "vmware",
"version": "4.0 (windows)"
},
{
"model": "websam securemaster",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "enterpriseaccessmanager version 3.x to 6.x"
},
{
"model": "cosminexus developer\u0027s kit for java",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"model": "windows server 2008",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(x86) sp2"
},
{
"model": "websam securemaster",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "enterprisedirectoryserver/rdb cooperation system all versions"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "12.1.2.0"
},
{
"model": "mac os x",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "(cfnetwork ssl python)"
},
{
"model": "ucosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "st ard-r"
},
{
"model": "cosminexus server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "st ard edition version 4"
},
{
"model": "hyperion",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "essbase 11.1.2.2"
},
{
"model": "cosminexus client",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 6"
},
{
"model": "ucosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "-r"
},
{
"model": "windows server 2008",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "r2(itanium) sp2"
},
{
"model": "infocage",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "pc security all versions"
},
{
"model": "xcode",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "4.4"
},
{
"model": "ruggedcom win5100",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "software v4.4"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.6.8 (apache)"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.7 to v10.7.2 (apache)"
},
{
"model": "cosminexus primary server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 6"
},
{
"model": "ruggedcom win7200",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "all versions"
},
{
"model": "windows server 2008",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "r2(x64) sp2"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.7.2 (java)"
},
{
"model": "xcode",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "(os x v10.7.4 and later )"
},
{
"model": "ucosminexus service platform",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "(64)"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.6.8 (apache)"
},
{
"model": "ruggedcom win5200",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "all versions"
},
{
"model": "ruggedcom win7200",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "software v4.4"
},
{
"model": "ruggedcom win7000",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "all versions"
},
{
"model": "internet explorer",
"scope": null,
"trust": 0.8,
"vendor": "microsoft",
"version": null
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.7 to v10.7.2 (apache)"
},
{
"model": "websam securemaster",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "accesscontrolserver version 3.x to 6.x"
},
{
"model": "ucosminexus primary server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "base"
},
{
"model": "cosminexus developer",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "professional version 6"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.7 to v10.7.4 (ruby)"
},
{
"model": "cosminexus http server",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"model": "cosminexus primary server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "base"
},
{
"model": "iplanet web server",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "7.0"
},
{
"model": "ruggedcom win7000",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "software v4.4"
},
{
"model": "virtualcenter",
"scope": "eq",
"trust": 0.8,
"vendor": "vmware",
"version": "2.5 (windows)"
},
{
"model": "fusion middleware",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "12.1.3"
},
{
"model": "windows server 2008",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(x64) sp2"
},
{
"model": "developer\u0027s kit for java",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"model": "ucosminexus service",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "architect"
},
{
"model": "ucosminexus client",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "for plug-in"
},
{
"model": "hp system management homepage",
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": "device manager",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "software"
},
{
"model": "java system web server",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "6.1"
},
{
"model": "database",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "11.1.0.7"
},
{
"model": "cosminexus developer",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 5"
},
{
"model": "ucosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "(64)"
},
{
"model": "ucosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "express"
},
{
"model": "windows vista",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "sp2"
},
{
"model": "windows server 2008",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(itanium) sp2"
},
{
"model": "web server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "- security enhancement"
},
{
"model": "ucosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "light"
},
{
"model": "windows 7",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(x32) sp1 before"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.7 to v10.7.3 (curl)"
},
{
"model": "database",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "11.2.0.2"
},
{
"model": "windows server 2003",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(itanium) sp2"
},
{
"model": "ucosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "enterprise"
},
{
"model": "cosminexus server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "web edition version 4"
},
{
"model": "windows xp",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(x64) sp2"
},
{
"model": "hyperion",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "essbase 11.1.2.3"
},
{
"model": "tv",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "4.0 to 4.3"
},
{
"model": "ucosminexus developer",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "01"
},
{
"model": "ucosminexus service",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "platform - messaging"
},
{
"model": "cosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "version 5"
},
{
"model": "websam securemaster",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "accesscontrolplugin version 3.x to 6.x"
},
{
"model": "processing kit for xml",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"model": "ucosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "none"
},
{
"model": "cosminexus developer",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "st ard version 6"
},
{
"model": "hirdb for java /xml",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"model": "ucosminexus developer",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "light"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "3.1 to 4.3.5 (ipod touch first 3 after generation )"
},
{
"model": "ucosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "st ard"
},
{
"model": "cosminexus developer",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "light version 6"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "3.2 to 4.3.5 (ipad)"
},
{
"model": "ruggedcom win5200",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "software v4.4"
},
{
"model": "ucosminexus developer",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "professional"
},
{
"model": "cosminexus application server",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "st ard version 6"
},
{
"model": "ucosminexus developer",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "none"
},
{
"model": "chrome",
"scope": null,
"trust": 0.8,
"vendor": "google",
"version": null
},
{
"model": "windows server 2003",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(x64) sp2"
},
{
"model": "ucosminexus client )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "ucosminexus service platform )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "jre .0 01",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "1.4"
},
{
"model": "jdk 01-b06",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "1.6"
},
{
"model": "ucosminexus primary server base )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "project openssl 1.0.0a",
"scope": null,
"trust": 0.6,
"vendor": "openssl",
"version": null
},
{
"model": "ucosminexus operator for service platform )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "web server linux",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "03-00"
},
{
"model": "web server 02-04-/b",
"scope": null,
"trust": 0.6,
"vendor": "hitachi",
"version": null
},
{
"model": "project openssl 0.9.8m",
"scope": null,
"trust": 0.6,
"vendor": "openssl",
"version": null
},
{
"model": "jre 1.5.0.0 09",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.4.2 28",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "jdk .0 04",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "1.5"
},
{
"model": "ucosminexus service architect )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "ucosminexus developer )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "ucosminexus service architect )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "jre .0 03",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "1.4"
},
{
"model": "cosminexus http server windows",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "web server hp-ux",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "03-00"
},
{
"model": "jdk 1.5.0.0 08",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "web server",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "01-02"
},
{
"model": "ucosminexus primary server base )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "project openssl 0.9.8n",
"scope": null,
"trust": 0.6,
"vendor": "openssl",
"version": null
},
{
"model": "ucosminexus application server-r )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "jdk .0 03",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jdk 1.5.0 12",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "jre .0 02",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "1.4"
},
{
"model": "cosminexus http server windows",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-00-10"
},
{
"model": "windows server sp1",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "web server linux",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "04-00"
},
{
"model": "jre 1.6.0 2",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "ucosminexus client )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "jre 1.4.2 27",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "jdk 07-b03",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jdk 06",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "1.5"
},
{
"model": "jre",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "1.4"
},
{
"model": "ucosminexus application server-r )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "jre 1.5.0.0 08",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "jre .0 04",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "1.4"
},
{
"model": "web server",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "02-04"
},
{
"model": "jdk 1.5.0.0 12",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "windows server sp2",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "ucosminexus operator for service platform )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "jdk 1.5.0.0 09",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "project openssl 0.9.8o",
"scope": null,
"trust": 0.6,
"vendor": "openssl",
"version": null
},
{
"model": "jdk 1.5.0.0 11",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "jdk 11-b03",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "1.5"
},
{
"model": "ucosminexus application server",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "ucosminexus application server )",
"scope": "eq",
"trust": 0.6,
"vendor": "hitachi",
"version": "09-50"
},
{
"model": "jre 1.5.0.0 07",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "jdk 1.6.0 01",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "jre 1.6.0 20",
"scope": null,
"trust": 0.6,
"vendor": "sun",
"version": null
},
{
"model": "windows xp home sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows vista edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "x640"
},
{
"model": "software opera web browser beta1",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.50"
},
{
"model": "fusion middleware 11g release",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "111.1.17"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.80"
},
{
"model": "java se sr8 fp1",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "11.11"
},
{
"model": "mac os server",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.3"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.2"
},
{
"model": "project openssl g",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "nonstop server h06.16.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "software opera web browser b",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.53"
},
{
"model": "enterprise linux as extras",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "windows xp professional edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "x64"
},
{
"model": "tv",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.1"
},
{
"model": "voice portal sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.1"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.10"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.2"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.14.1"
},
{
"model": "windows server for 32-bit systems",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20080"
},
{
"model": "java se",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7.0"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "11.50"
},
{
"model": "web server windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-10"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.63"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.70"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.10"
},
{
"model": "windows xp tablet pc edition sp3",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows vista business 64-bit edition x64-enterprise",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.7"
},
{
"model": "project openssl b-36.8",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.0-68"
},
{
"model": "power systems 350.c0",
"scope": null,
"trust": 0.3,
"vendor": "ibm",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10.0.648.127"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.225"
},
{
"model": "nonstop server j06.09.03",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.50"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.219"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.30"
},
{
"model": "web server windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-10-03"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.15.2"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.20"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.2.1"
},
{
"model": "power systems 350.b1",
"scope": null,
"trust": 0.3,
"vendor": "ibm",
"version": null
},
{
"model": "web server windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-10-01(x64)"
},
{
"model": "ip office application server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "java se sr12",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "meeting exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0.0.52"
},
{
"model": "windows server standard edition gold itanium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-"
},
{
"model": "flex system imm2",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "1.00"
},
{
"model": "windows server r2 enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "cosminexus developer standard",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.12"
},
{
"model": "nonstop server h06.18.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "nonstop server j06.15.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "nonstop server h06.22.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "windows xp media center edition sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2005"
},
{
"model": "websphere datapower soa appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "3.8"
},
{
"model": "websphere datapower soa appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "rational appscan enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.0.0.1"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.51"
},
{
"model": "meeting exchange web conferencing server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "-0"
},
{
"model": "java se",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.6"
},
{
"model": "windows server r2 web edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "system management homepage c",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.10.186"
},
{
"model": "project openssl h",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.2"
},
{
"model": "project openssl i",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.2"
},
{
"model": "nonstop server j06.08.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "project openssl b",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "windows xp home sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows vista home basic sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "nonstop server j06.16",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.200"
},
{
"model": "ucosminexus client for plug-in",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "ucosminexus application server",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "nonstop server j6.0.14.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "java sdk sr10",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "6"
},
{
"model": "vplex geosynchrony sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.2"
},
{
"model": "software opera web browser win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.68"
},
{
"model": "forms and reports 11g release",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "211.1.2.1"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "350.00"
},
{
"model": "windows for 32-bit systems",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "70"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "770.22"
},
{
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.3"
},
{
"model": "flex system chassis management module",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "cosminexus application server",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.303"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "windows server r2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008x640"
},
{
"model": "jdk 1.5.0 11",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "software opera web browser 1win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.0"
},
{
"model": "ucosminexus developer light",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "flex system imm2",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "2.00"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.211"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.104"
},
{
"model": "nonstop server j06.07.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.0.0-95"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.10"
},
{
"model": "jrockit r28.0.0",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "8.51"
},
{
"model": "meeting exchange sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "web server )",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "02-03"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.21.6"
},
{
"model": "jdk 1.5.0.0 06",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "ucosminexus service platform",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "cosminexus developer\u0027s kit for java (windows(x8",
"scope": "ne",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-50-01"
},
{
"model": "software opera web browser",
"scope": "ne",
"trust": 0.3,
"vendor": "opera",
"version": "11.51"
},
{
"model": "cosminexus developer\u0027s kit for java",
"scope": "ne",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00-06"
},
{
"model": "ucosminexus application server light",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "nonstop server h06.15.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "meeting exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "13.0.782.107"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "14"
},
{
"model": "windows server standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20080"
},
{
"model": "system management homepage b",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.5.146"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.54"
},
{
"model": "windows server sp2 enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-x64"
},
{
"model": "system networking ethernet switch",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.1"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.51"
},
{
"model": "windows server gold standard",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "jrockit r28.1.1",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "773.10"
},
{
"model": "windows server r2 standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20080"
},
{
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.40"
},
{
"model": "system management homepage a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.11.197"
},
{
"model": "web server hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-10"
},
{
"model": "firefox beta1",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "4.0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.15210"
},
{
"model": "windows vista business",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "tv",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.0"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.17"
},
{
"model": "project openssl l",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.11.1"
},
{
"model": "proactive contact",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"model": "windows server for x64-based systems",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20080"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.10"
},
{
"model": "windows server standard edition gold web",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-"
},
{
"model": "aura communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "windows server itanium sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.1"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.3"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.3"
},
{
"model": "windows xp home sp3",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "software opera web browser win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "5.12"
},
{
"model": "java sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.5"
},
{
"model": "software opera web browser beta2",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.50"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.018"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.019"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.3"
},
{
"model": "project openssl d",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.17"
},
{
"model": "enterprise linux hpc node optional",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "windows vista ultimate 64-bit edition sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "11.00"
},
{
"model": "project openssl beta2",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.10"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.6"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3"
},
{
"model": "enterprise linux server supplementary",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "350.60"
},
{
"model": "nonstop server j06.13.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "iq",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1.1"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.25"
},
{
"model": "windows home premium sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "7-x32"
},
{
"model": "jdk 1.5.0 11-b03",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "windows server gold compute cluster",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "aura communication manager utility services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "software opera web browser win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "5.02"
},
{
"model": "rsa bsafe micro edition suite",
"scope": "ne",
"trust": 0.3,
"vendor": "emc",
"version": "4.0.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.19"
},
{
"model": "project openssl e",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "windows server standard edition gold datacenter",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-"
},
{
"model": "project openssl f",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "enterprise linux workstation supplementary",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "project openssl",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "access manager sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "3.1"
},
{
"model": "windows vista home premium sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.24"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.04"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.65"
},
{
"model": "windows vista home premium 64-bit edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "0"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.15"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.10"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.60"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.12.3"
},
{
"model": "windows server r2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "project openssl 1.0.0c",
"scope": null,
"trust": 0.3,
"vendor": "openssl",
"version": null
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.19"
},
{
"model": "windows server sp1 platform sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "software opera web browser beta1",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.10"
},
{
"model": "windows server enterprise edition itanium sp1 beta",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20031"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.00"
},
{
"model": "windows server sp2 beta",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.100"
},
{
"model": "java se",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.0"
},
{
"model": "windows server r2 x64-datacenter",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "cosminexus http server hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.7"
},
{
"model": "windows server enterprise edition itanium sp2 itanium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "windows for 32-bit systems sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "7"
},
{
"model": "windows vista business 64-bit edition x64-ultimate",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows xp professional edition sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "x64"
},
{
"model": "proactive contact",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.2.1"
},
{
"model": "nonstop server j06.15",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.9.2"
},
{
"model": "aura presence services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "windows rc",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "7"
},
{
"model": "windows server for 32-bit systems sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "jre 07",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.1"
},
{
"model": "callpilot",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "windows vista home premium",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "cosminexus",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "9.0"
},
{
"model": "vplex geosynchrony",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "4.0"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.4"
},
{
"model": "web server windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-10-10"
},
{
"model": "ucosminexus application server enterprise )",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-80"
},
{
"model": "aura system platform",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0.2"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "aura experience portal",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "control patch",
"scope": "eq",
"trust": 0.3,
"vendor": "kerio",
"version": "7.1.01"
},
{
"model": "project openssl beta3",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "1.0"
},
{
"model": "ipad",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "0"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10.0.648.133"
},
{
"model": "nonstop server h06.21.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.3.132"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.13.2"
},
{
"model": "access manager sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "3.1"
},
{
"model": "linux enterprise java sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11"
},
{
"model": "jre 1.5.0 08",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "software opera web browser",
"scope": "ne",
"trust": 0.3,
"vendor": "opera",
"version": "11.60"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "350.20"
},
{
"model": "web server windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-00-060"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.101"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.2"
},
{
"model": "ucosminexus application server smart edition",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.14"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.8"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "8.52"
},
{
"model": "cosminexus developer",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "6.0"
},
{
"model": "meeting exchange recording server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "-0"
},
{
"model": "mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.4"
},
{
"model": "cosminexus developer",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "5"
},
{
"model": "desktop extras",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.52"
},
{
"model": "nonstop server j06.06.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.5"
},
{
"model": "windows server web edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "openpages grc platform",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.0"
},
{
"model": "windows server r2 enterprise edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "rsa bsafe ssl-c",
"scope": "ne",
"trust": 0.3,
"vendor": "emc",
"version": "2.8.6"
},
{
"model": "nonstop server j06.06.03",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "nonstop server h06.17.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "ios",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "5"
},
{
"model": "jdk update21",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3.3"
},
{
"model": "simatic rf68xr",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "3.2.1"
},
{
"model": "network node manager i",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "9.1"
},
{
"model": "windows server standard edition release candidate",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "windows server standard edition sp2 web",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.2"
},
{
"model": "fusion middleware",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "12.1.3.0.0"
},
{
"model": "database 11g release",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "211.2.0.3"
},
{
"model": "rational appscan enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.5.0.1"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.5"
},
{
"model": "windows server terminal services",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "8.54"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.9"
},
{
"model": "nonstop server h06.17.03",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "software opera web browser beta",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "83"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "9.0.597.84"
},
{
"model": "jre 21",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "enterprise linux hpc node",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "windows server standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "project openssl 0.9.8s",
"scope": null,
"trust": 0.3,
"vendor": "openssl",
"version": null
},
{
"model": "ios beta",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2"
},
{
"model": "windows vista home premium 64-bit edition sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.2"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.1.0.103"
},
{
"model": "cms server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "16.2"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "0"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "windows vista business 64-bit edition x86-ultimate",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "linux enterprise java sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "java se sr1",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "7"
},
{
"model": "windows server gold datacenter",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.53"
},
{
"model": "iq",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.4"
},
{
"model": "windows server r2 enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "350.70"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.1"
},
{
"model": "tv",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.1"
},
{
"model": "nonstop server h06.27",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.20.2"
},
{
"model": "nonstop server j06.14.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "12.0.742.100"
},
{
"model": "tv",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.10.186"
},
{
"model": "rational appscan standard",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7.8"
},
{
"model": "windows server datacenter edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "jrockit r27.6.0-50",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "1.5.015"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.105"
},
{
"model": "windows server r2 datacenter edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "project openssl b",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.8"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "8.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7"
},
{
"model": "jdk 01",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6"
},
{
"model": "nonstop server j06.08.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.306"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.2"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.64"
},
{
"model": "project openssl k",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.8"
},
{
"model": "windows server sp1 compute cluster",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.13"
},
{
"model": "java se",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6"
},
{
"model": "web server hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-10-02"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.1"
},
{
"model": "software opera web browser win32 beta",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.01"
},
{
"model": "jrockit r27.6.5",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.222"
},
{
"model": "aura system platform",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "9.0.597.107"
},
{
"model": "java se sr10",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.0"
},
{
"model": "nonstop server j06.04.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "web server solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-00-01"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.2.77"
},
{
"model": "software opera web browser linux",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.217"
},
{
"model": "windows vista business 64-bit edition x86-enterprise",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.40"
},
{
"model": "linux enterprise server sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "windows server gold x64-datacenter",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "business server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "1"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.22"
},
{
"model": "enterprise linux extras",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "ucosminexus operator",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.0.96"
},
{
"model": "voice portal",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1.2"
},
{
"model": "web server security enhancement",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "-0"
},
{
"model": "aura application server sip core",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "53002.0"
},
{
"model": "voice portal",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "java system application server",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "8.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.77"
},
{
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "project openssl g",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "aura messaging",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "windows server for itanium-based systems r2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.1"
},
{
"model": "rsa bsafe ssl-j",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "6.0"
},
{
"model": "windows server for itanium-based systems",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20080"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "13.0.782.112"
},
{
"model": "websphere datapower soa appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.344"
},
{
"model": "cosminexus developer\u0027s kit for java (windows(x8",
"scope": "ne",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00-06"
},
{
"model": "jdk update24",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "13.0.782.215"
},
{
"model": "meeting exchange client registration server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "-0"
},
{
"model": "openpages grc platform",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.5.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3.1"
},
{
"model": "proactive contact",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.2.2"
},
{
"model": "enterprise linux desktop supplementary",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "rational appscan enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.0.1.1"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.1.0.102"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.57"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.0"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "760.31"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.18"
},
{
"model": "voice portal sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "windows server enterprise edition sp1 beta",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20031"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.0.2"
},
{
"model": "web server hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-00-05"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.81"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2011"
},
{
"model": "jdk 1.5.0.0 04",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "vcenter",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "5.0"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.1"
},
{
"model": "aura session manager sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.11.2"
},
{
"model": "iq",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.215"
},
{
"model": "windows server r2 standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "project openssl h",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "windows server r2 for x64-based systems sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.1"
},
{
"model": "project openssl a",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.5"
},
{
"model": "software opera web browser j",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.11"
},
{
"model": "project openssl i",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "nonstop server h06.25",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.302"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.19.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3.5"
},
{
"model": "windows vista business 64-bit edition sp1 x86-enterprise",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.04"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.1-73"
},
{
"model": "power systems 350.b0",
"scope": null,
"trust": 0.3,
"vendor": "ibm",
"version": null
},
{
"model": "openpages grc platform",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.5.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.13"
},
{
"model": "database 11g release",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "211.2.0.2"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.20"
},
{
"model": "windows vista edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "x64"
},
{
"model": "enterprise linux for sap server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "security appscan standard",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "8.6"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.00"
},
{
"model": "meeting exchange sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "project openssl c",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "project openssl",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "1.0.2"
},
{
"model": "project openssl beta2",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "1.0"
},
{
"model": "system management homepage b",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.2.77"
},
{
"model": "java se sr9",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.0.0"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.68"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "760.30"
},
{
"model": "nonstop server j06.07.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "message networking sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "linux enterprise server for vmware sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11"
},
{
"model": "project openssl",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.549.0"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.013"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "8.50"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.207"
},
{
"model": "jdk",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5"
},
{
"model": "project openssl c",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.1"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "350.80"
},
{
"model": "nonstop server j06.08.04",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "rational appscan standard",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.5.0.1"
},
{
"model": "flex system cmm 1.40.2q",
"scope": null,
"trust": 0.3,
"vendor": "ibm",
"version": null
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.06"
},
{
"model": "enterprise server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "5"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0.1"
},
{
"model": "jdk 07",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5"
},
{
"model": "cosminexus developer\u0027s kit for java (windows(x6",
"scope": "ne",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-50-01"
},
{
"model": "tv",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "4.4"
},
{
"model": "nonstop server h06.24",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "access manager",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "3.1"
},
{
"model": "windows server datacenter edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "nonstop server h06.16.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "ucosminexus developer professional for plug-in",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "nonstop server h06.18.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "meeting exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.223"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.23"
},
{
"model": "windows server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "cosminexus",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "6.0"
},
{
"model": "jdk update13",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "software opera web browser linux",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0.3"
},
{
"model": "windows server r2 datacenter edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "4.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "13"
},
{
"model": "windows server gold x64-enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "nonstop server h06.19.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "windows for itanium-based systems sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "7"
},
{
"model": "proactive contact",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.1"
},
{
"model": "project openssl 1.0.0e",
"scope": null,
"trust": 0.3,
"vendor": "openssl",
"version": null
},
{
"model": "windows server enterprise edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "773.00"
},
{
"model": "project openssl beta1",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "1.0"
},
{
"model": "project openssl a",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10.0.648.128"
},
{
"model": "jrockit r28.0.1",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "jdk update19",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "openpages grc platform",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "6.2.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.0"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.3"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.15"
},
{
"model": "windows server r2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "software opera web browser beta build",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.2012981"
},
{
"model": "project openssl c",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.222"
},
{
"model": "windows server for x64-based systems r2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.2"
},
{
"model": "windows server datacenter edition sp1 beta",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20031"
},
{
"model": "windows server r2 datacenter sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.04"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.14.20"
},
{
"model": "cosminexus studio standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "-0"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9"
},
{
"model": "windows xp tablet pc edition sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "project openssl l",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "web server",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "02-05"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "6"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "8.53"
},
{
"model": "cms server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "16.1"
},
{
"model": "windows server r2 itanium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20080"
},
{
"model": "windows xp professional sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows server for itanium-based systems sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "nonstop server j06.11.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "java se sr9-fp2",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.0.0"
},
{
"model": "business server",
"scope": "eq",
"trust": 0.3,
"vendor": "collax",
"version": "5.5.11"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.72"
},
{
"model": "windows server standard edition sp2 hpc",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2011"
},
{
"model": "update manager update",
"scope": "ne",
"trust": 0.3,
"vendor": "vmware",
"version": "5.01"
},
{
"model": "ucosminexus developer professional",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.551.1"
},
{
"model": "glassfish enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "2.1.1"
},
{
"model": "windows vista ultimate",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.10"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.20"
},
{
"model": "virtualcenter",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5"
},
{
"model": "jrockit r27.6.7",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "rational appscan enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.0.1"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.01"
},
{
"model": "nonstop server h06.20.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "vcenter",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "4.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "12"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.20"
},
{
"model": "jre 10-b03",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "jrockit r27.6.0",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.61"
},
{
"model": "hp-ux b.11.31",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "java se",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "1.4.2"
},
{
"model": "project openssl e",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "rational appscan enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.0.0"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "350.90"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.1"
},
{
"model": "messaging storage server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "nonstop server j06.05.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "jre 07",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5"
},
{
"model": "nonstop server j06.07.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "project openssl",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "windows server gold",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "aura session manager sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3.4"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.53"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.10.8"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.20.1"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.71"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.0.1.104"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.220"
},
{
"model": "java ibm 31-bit sdk for z/os",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.0"
},
{
"model": "aura session manager sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "windows server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20080"
},
{
"model": "project openssl k",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.16.4"
},
{
"model": "cosminexus developer professional",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.10"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.1.73"
},
{
"model": "project openssl beta3",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "java se sr5",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.0"
},
{
"model": "rsa bsafe ssl-c",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "2.8.5"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.0"
},
{
"model": "cosminexus http server windows",
"scope": "ne",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00-11"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.1"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "760.00"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.102"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.8"
},
{
"model": "nonstop server h06.21.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "windows vista business 64-bit edition sp1 x64-enterprise",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "software opera web browser linux",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.10"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.16"
},
{
"model": "java se",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7"
},
{
"model": "software opera web browser beta1",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.60"
},
{
"model": "software opera web browser win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0.5"
},
{
"model": "ucosminexus service platform aix",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00(64)"
},
{
"model": "web server windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-10-03(x64)"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "0"
},
{
"model": "linux enterprise software development kit sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.8.179"
},
{
"model": "web server aix",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-00"
},
{
"model": "software opera web browser beta1",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.00"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "770.20"
},
{
"model": "power systems 350.d0",
"scope": null,
"trust": 0.3,
"vendor": "ibm",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.224"
},
{
"model": "business server",
"scope": "ne",
"trust": 0.3,
"vendor": "collax",
"version": "5.5.12"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.61"
},
{
"model": "flex system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "enterprise linux desktop optional",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "enterprise linux hpc node supplementary",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "enterprise linux desktop supplementary client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.308"
},
{
"model": "ip office application server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "7.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.8.5"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.10.6"
},
{
"model": "jdk update17",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "windows server datacenter edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.4"
},
{
"model": "rational appscan enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.6"
},
{
"model": "aura system platform",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0.1"
},
{
"model": "windows server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "cosminexus http server",
"scope": "ne",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00-13"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.12"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.54"
},
{
"model": "nonstop server j06.05.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "software opera web browser .6win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0"
},
{
"model": "openpages grc platform",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.1"
},
{
"model": "sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.221"
},
{
"model": "sdk 02",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.201"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.672.2"
},
{
"model": "jdk 0 03",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.1"
},
{
"model": "jdk update20",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "windows server standard edition r2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.62"
},
{
"model": "proactive contact",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0.1"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.61"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.237"
},
{
"model": "linux enterprise desktop sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "windows vista business 64-bit edition sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "nonstop server h06.17.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "773.02"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "770.31"
},
{
"model": "nonstop server j06.08.03",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "aura conferencing standard",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "nonstop server j06.10.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "windows vista home premium 64-bit edition sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows xp embedded sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows server datacenter edition itanium sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "nonstop server h06.17.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "freeflow print server 91.d2.32",
"scope": null,
"trust": 0.3,
"vendor": "xerox",
"version": null
},
{
"model": "windows vista business 64-bit edition sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "cosminexus server web edition",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "linux enterprise for sap applications sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.2.6"
},
{
"model": "rsa bsafe micro edition suite",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "3.1"
},
{
"model": "windows vista enterprise 64-bit edition sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows server sp1 storage",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "project openssl 1.0.0d",
"scope": null,
"trust": 0.3,
"vendor": "openssl",
"version": null
},
{
"model": "meeting exchange streaming server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "-0"
},
{
"model": "processing kit for xml",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "rsa bsafe micro edition suite",
"scope": "ne",
"trust": 0.3,
"vendor": "emc",
"version": "3.2.6"
},
{
"model": "java se sr11 pf1",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.0"
},
{
"model": "lotus domino",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.5.3"
},
{
"model": "web server hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-00"
},
{
"model": "groupware suite",
"scope": "eq",
"trust": 0.3,
"vendor": "collax",
"version": "5.5.11"
},
{
"model": "cosminexus studio web edition",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "-0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.213"
},
{
"model": "nonstop server h06.15.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "voice portal sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.1"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.06"
},
{
"model": "cosminexus application server standard",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.15"
},
{
"model": "windows server standard edition itanium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "nonstop server j06.14",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "sdk 01",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "760.40"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.70"
},
{
"model": "windows vista ultimate 64-bit edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "0"
},
{
"model": "ucosminexus application server standard",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "openpages grc platform",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.5"
},
{
"model": "jre 1.5.0 09-b03",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "system integrated management module",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "x2"
},
{
"model": "windows vista enterprise 64-bit edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "0"
},
{
"model": "nonstop server h06.26",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "rsa bsafe ssl-j",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.1.1"
},
{
"model": "windows server web edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.218"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.10"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.2"
},
{
"model": "nonstop server j06.13",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "aura communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.14"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2010.1"
},
{
"model": "project openssl j",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.8"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "770.21"
},
{
"model": "nonstop server j06.09.04",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "web server windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-10"
},
{
"model": "mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.3"
},
{
"model": "meeting exchange sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "messaging application server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.6.156"
},
{
"model": "windows for itanium-based systems",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "70"
},
{
"model": "ir",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.10"
},
{
"model": "project openssl",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "1.0"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.45"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.7"
},
{
"model": "software opera web browser mac",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "5.0"
},
{
"model": "nonstop server j06.05.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "cosminexus server standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "rational policy tester",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.5.0.1"
},
{
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.216"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.1"
},
{
"model": "rsa bsafe micro edition suite",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "4.0"
},
{
"model": "rational policy tester",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.5"
},
{
"model": "rsa bsafe micro edition suite",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "3.2"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.19"
},
{
"model": "project openssl beta5",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "1.0.0"
},
{
"model": "windows server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "windows server enterprise edition itanium sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "windows server gold enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "windows vista sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.6"
},
{
"model": "websphere datapower soa appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "3.8.1"
},
{
"model": "jrockit r27.1.0",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "project openssl a",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "fusion middleware 11g release",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "111.1.16"
},
{
"model": "windows vista business 64-bit edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "0"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.23.1"
},
{
"model": "websphere multichannel bank transformation toolkit",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.1"
},
{
"model": "vplex geosynchrony",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.2.1"
},
{
"model": "software opera web browser b",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.11"
},
{
"model": "enterprise linux supplementary server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "voice portal",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"model": "jrockit r28.1.4",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.2.9.1"
},
{
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.1.0-103"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.12.201"
},
{
"model": "windows xp media center edition sp3",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.16"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.01"
},
{
"model": "rational appscan standard",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.0.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.12"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "nonstop server j06.09.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "windows server enterprise edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "enterprise linux desktop client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "jrockit r27.6.6",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "nonstop server j06.06.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "project openssl 0.9.8q",
"scope": null,
"trust": 0.3,
"vendor": "openssl",
"version": null
},
{
"model": "windows xp media center edition",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.4"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.012"
},
{
"model": "software opera web browser beta2",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.00"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.17"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.15.3"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "760.11"
},
{
"model": "aura presence services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "lotus domino",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.5.2"
},
{
"model": "bladecenter advanced management module",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.2.127"
},
{
"model": "java sdk sr13 fp11",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "1.4.2"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.50"
},
{
"model": "cms server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "16.0"
},
{
"model": "windows server gold storage",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "jrockit r27.6.8",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.02"
},
{
"model": "windows xp mode",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "70"
},
{
"model": "software opera web browser win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.0"
},
{
"model": "windows vista home premium sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.310"
},
{
"model": "cosminexus developer\u0027s kit for java (windows(x6",
"scope": "ne",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00-06"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.62"
},
{
"model": "web server hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-10-01"
},
{
"model": "software opera web browser win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0.1"
},
{
"model": "windows server r2 sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008x64"
},
{
"model": "callpilot",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"model": "project openssl 0.9.8g",
"scope": null,
"trust": 0.3,
"vendor": "openssl",
"version": null
},
{
"model": "linux enterprise software development kit sp1 for sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11"
},
{
"model": "voice portal sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.11"
},
{
"model": "windows vista home basic 64-bit edition sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "cosminexus studio",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "windows server standard edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "java se sr12-fp5",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.0"
},
{
"model": "openjdk",
"scope": "eq",
"trust": 0.3,
"vendor": "openjdk",
"version": "6"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.202"
},
{
"model": "windows vista business sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows server standard edition gold hpc",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-"
},
{
"model": "windows server gold x64-standard",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "web server windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-00-05"
},
{
"model": "jre beta",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "software opera web browser win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "5.10"
},
{
"model": "java sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "1.4.2"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.15.5"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "350.30"
},
{
"model": "jrockit r27.6.4",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "ip office application server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "aura system manager sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.1.1"
},
{
"model": "messaging storage server sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "14.0.835.186"
},
{
"model": "windows server sp2 storage",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.015"
},
{
"model": "windows vista enterprise sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "cosminexus application server",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "5.0"
},
{
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2010.1"
},
{
"model": "sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.219"
},
{
"model": "java se sr10",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "9.0.597.94"
},
{
"model": "cosminexus http server",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00-10"
},
{
"model": "nonstop server h06.20.03",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "proactive contact",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.2"
},
{
"model": "aura system platform",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.0"
},
{
"model": "java se sr11",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.0"
},
{
"model": "windows server standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008x64"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "770.10"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.2"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.80"
},
{
"model": "ucosminexus service platform hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "freeflow print server 73.c5.11",
"scope": null,
"trust": 0.3,
"vendor": "xerox",
"version": null
},
{
"model": "rsa bsafe ssl-j",
"scope": "ne",
"trust": 0.3,
"vendor": "emc",
"version": "6.0.1"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.50"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "5"
},
{
"model": "web server windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-00"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "8.02"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.52"
},
{
"model": "windows xp tablet pc edition",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows professional",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "70"
},
{
"model": "ucosminexus developer )",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "meeting exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10.0.648.204"
},
{
"model": "project openssl",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.8"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.551.0"
},
{
"model": "tls",
"scope": "eq",
"trust": 0.3,
"vendor": "ietf",
"version": "1.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.301"
},
{
"model": "enterprise linux workstation optional",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.90"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.00"
},
{
"model": "rsa bsafe ssl-j",
"scope": "ne",
"trust": 0.3,
"vendor": "emc",
"version": "5.1.2"
},
{
"model": "project openssl",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.4"
},
{
"model": "jdk update23",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "12.0.742.112"
},
{
"model": "linux enterprise server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.3"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.03"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "8.0.2"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.10"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.10.7"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.6"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.51"
},
{
"model": "jre 28",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "system management homepage b",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.10.186"
},
{
"model": "firefox beta",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.62"
},
{
"model": "project openssl d",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.8"
},
{
"model": "windows server itanium sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "windows server sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "control",
"scope": "eq",
"trust": 0.3,
"vendor": "kerio",
"version": "7.1.0"
},
{
"model": "windows server datacenter edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20080"
},
{
"model": "web server )",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "02-04"
},
{
"model": "cosminexus http server linux",
"scope": "ne",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00-12"
},
{
"model": "mac os server",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.4"
},
{
"model": "flex system cmm",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "1.00"
},
{
"model": "rsa bsafe micro edition suite",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "4.0.3"
},
{
"model": "project openssl 1.0.0b",
"scope": null,
"trust": 0.3,
"vendor": "openssl",
"version": null
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.52"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "11.01"
},
{
"model": "ucosminexus developer standard",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "web server 01-02-/d",
"scope": null,
"trust": 0.3,
"vendor": "hitachi",
"version": null
},
{
"model": "http server 12c",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "12.1.2"
},
{
"model": "windows server r2 x64-enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.11"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.1.2"
},
{
"model": "windows server gold",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "aura system manager sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "aura communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.4.143"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.15"
},
{
"model": "project openssl f",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.8"
},
{
"model": "java system application server",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "8.1"
},
{
"model": "windows xp embedded sp3",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.60"
},
{
"model": "windows vista ultimate 64-bit edition sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows server datacenter edition release candidate",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "jdk 0 09",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.2.0-12"
},
{
"model": "windows server r2 enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20080"
},
{
"model": "hirdb for java",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.7"
},
{
"model": "vcenter",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "4.1"
},
{
"model": "proactive contact",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "jre 04",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.1"
},
{
"model": "windows xp professional",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.300"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.021"
},
{
"model": "rational policy tester",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.0"
},
{
"model": "software opera web browser beta",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.50"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.51"
},
{
"model": "enterprise linux server optional",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.5.146"
},
{
"model": "nonstop server j06.04.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "software opera web browser win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0.3"
},
{
"model": "windows home premium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "70"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.46"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.2"
},
{
"model": "windows vista sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "ucosminexus primary server base",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.15.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.5"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.22"
},
{
"model": "windows server r2 enterprise edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "project openssl m",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.205"
},
{
"model": "windows xp media center edition sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows starter",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "70"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.07"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.204"
},
{
"model": "cosminexus http server hp-ux",
"scope": "ne",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00-13"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "11.10"
},
{
"model": "lotus domino",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.0"
},
{
"model": "jdk update25",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "lotus domino",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.5.1"
},
{
"model": "java se sr13-fp11",
"scope": "ne",
"trust": 0.3,
"vendor": "ibm",
"version": "1.4.2"
},
{
"model": "project openssl j",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "windows server sp2 datacenter",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "windows server standard edition gold standard",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-"
},
{
"model": "windows vista home basic sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "voice portal",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"model": "aura system platform sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.103"
},
{
"model": "windows server standard edition sp2 storage",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-"
},
{
"model": "jdk 1.6.0 01-b06",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.18.1"
},
{
"model": "web server 02-04-/c",
"scope": null,
"trust": 0.3,
"vendor": "hitachi",
"version": null
},
{
"model": "cosminexus developer light",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.71"
},
{
"model": "ucosminexus client",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "windows server standard edition r2 sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "meeting exchange webportal",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "-6.0"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "12.0.742.91"
},
{
"model": "software opera web browser beta",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.601"
},
{
"model": "aura communication manager utility services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "web server solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-00"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.017"
},
{
"model": "windows server r2 compute cluster",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.210"
},
{
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"model": "web server hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-00-01"
},
{
"model": "jdk 1.5.0.0 03",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "windows vista ultimate sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.227"
},
{
"model": "project openssl k",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.309"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.214"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.19.4"
},
{
"model": "sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.224"
},
{
"model": "ucosminexus service platform linux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00(x64)"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.9"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "10"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.11"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7"
},
{
"model": "windows server standard edition gold storage",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-"
},
{
"model": "windows for x64-based systems",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "70"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.52"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.1"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.8"
},
{
"model": "nonstop server h06.20.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "cosminexus developer no version",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.0.121"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "14.0.835.163"
},
{
"model": "jdk update18",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.304"
},
{
"model": "windows vista enterprise sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.11"
},
{
"model": "nonstop server j06.09.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.305"
},
{
"model": "windows xp professional sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.60"
},
{
"model": "windows server r2 datacenter edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "iq",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"model": "tv",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.0"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.13.1"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.16"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.50"
},
{
"model": "rsa bsafe micro edition suite",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "3.2.4"
},
{
"model": "nonstop server h06.18.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "cosminexus application server no version",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "websphere datapower soa appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "770.00"
},
{
"model": "stenberg curl",
"scope": "ne",
"trust": 0.3,
"vendor": "daniel",
"version": "7.24.0"
},
{
"model": "windows server r2 datacenter",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20080"
},
{
"model": "windows vista home basic 64-bit edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "x64"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "760.10"
},
{
"model": "project openssl 0.9.8f",
"scope": null,
"trust": 0.3,
"vendor": "openssl",
"version": null
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "350.50"
},
{
"model": "linux enterprise sdk sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "4.0.1"
},
{
"model": "windows vista enterprise 64-bit edition sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.203"
},
{
"model": "proactive contact",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.1.1"
},
{
"model": "nonstop server h06.19.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "windows server enterprise edition itanium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "windows vista home basic",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "windows vista business 64-bit edition sp1 x86-ultimate",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.7"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "web server aix",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-00"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.0.1"
},
{
"model": "freeflow print server 81.d0.73",
"scope": null,
"trust": 0.3,
"vendor": "xerox",
"version": null
},
{
"model": "meeting exchange sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.208"
},
{
"model": "project openssl b",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "windows server enterprise edition itanium sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "software opera web browser beta3",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.00"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "windows server standard edition sp1 beta",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20031"
},
{
"model": "nonstop server j06.06.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "cms server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "15.0"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.12"
},
{
"model": "jrockit r27.6.2",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.3"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.2-77"
},
{
"model": "ucosminexus application server express",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-70"
},
{
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.8"
},
{
"model": "web server",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-00-01"
},
{
"model": "aura system platform sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "system management homepage",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "7.2.1"
},
{
"model": "simatic rf615r",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "3.2.1"
},
{
"model": "windows vista edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "x64"
},
{
"model": "windows server gold itanium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "windows server datacenter edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "jre 27",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.2"
},
{
"model": "rational appscan standard",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.0.0.3"
},
{
"model": "windows vista business 64-bit edition sp1 x64-ultimate",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.209"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.226"
},
{
"model": "windows server standard edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.014"
},
{
"model": "cosminexus application server enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "nonstop server j06.12.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "windows server enterprise edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "jrockit r27.6.9",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "project openssl 0.9.8r",
"scope": null,
"trust": 0.3,
"vendor": "openssl",
"version": null
},
{
"model": "windows server r2 storage",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "power systems 350.a0",
"scope": null,
"trust": 0.3,
"vendor": "ibm",
"version": null
},
{
"model": "simatic rf68xr",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "3.1"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.011"
},
{
"model": "windows vista business 64-bit edition sp1 x64-home premium",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "nonstop server j06.09.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "jrockit r27.6.3",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.9"
},
{
"model": "jdk update14",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "cosminexus",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "8.0"
},
{
"model": "project openssl beta4",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "1.0.0"
},
{
"model": "java se sr6",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.0.1"
},
{
"model": "windows server standard edition gold enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "tv",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3"
},
{
"model": "meeting exchange sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "project openssl 0.9.8p",
"scope": null,
"trust": 0.3,
"vendor": "openssl",
"version": null
},
{
"model": "windows server standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "rsa bsafe micro edition suite",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "4.0.2"
},
{
"model": "ucosminexus developer",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "010"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.15-210"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.27"
},
{
"model": "ucosminexus service architect",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "messaging application server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5"
},
{
"model": "windows server r2 sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.0.0.95"
},
{
"model": "windows xp tablet pc edition sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "ucosminexus service platform messaging",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "-0"
},
{
"model": "voice portal sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.18"
},
{
"model": "networks matrixssl",
"scope": "ne",
"trust": 0.3,
"vendor": "peersec",
"version": "3.2.2"
},
{
"model": "windows server standard edition gold",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008-"
},
{
"model": "windows server r2 platfom sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "windows vista ultimate sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "web server",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-00-02"
},
{
"model": "nonstop server j06.10.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "aura messaging",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0.1"
},
{
"model": "secure sockets layer",
"scope": "eq",
"trust": 0.3,
"vendor": "ietf",
"version": "3.0"
},
{
"model": "windows ultimate",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "70"
},
{
"model": "windows server standard edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "rsa bsafe micro edition suite",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "3.2.5"
},
{
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "nonstop server h06.24.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.23"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0"
},
{
"model": "project openssl d",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "windows server r2 standard",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.60"
},
{
"model": "messaging storage server sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "websphere multichannel bank transformation toolkit",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.1.0.2"
},
{
"model": "windows vista home basic 64-bit edition sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "connect build",
"scope": "eq",
"trust": 0.3,
"vendor": "kerio",
"version": "7.1.42985"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.10"
},
{
"model": "web server 02-04-/a (windows(ip",
"scope": null,
"trust": 0.3,
"vendor": "hitachi",
"version": null
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.19.6"
},
{
"model": "windows server datacenter edition itanium sp1 beta",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20031"
},
{
"model": "windows server for x64-based systems sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.5"
},
{
"model": "virtualcenter update 6b",
"scope": "ne",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5"
},
{
"model": "project openssl a",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "simatic rf68xr",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "3.2"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.04"
},
{
"model": "jre 1.5.0 09",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "project openssl f",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "cosminexus http server hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00-10"
},
{
"model": "enterprise linux ws extras",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.6"
},
{
"model": "windows xp home",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.10"
},
{
"model": "windows server web edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "hp-ux b.11.11",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "software opera web browser 3win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.0"
},
{
"model": "enterprise linux es extras",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "openjdk",
"scope": "eq",
"trust": 0.3,
"vendor": "openjdk",
"version": "1.6"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.010"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.8"
},
{
"model": "firefox beta",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.63"
},
{
"model": "software opera web browser 2win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3.0.64"
},
{
"model": "windows server itanium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "8.01"
},
{
"model": "windows xp service pack",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "30"
},
{
"model": "nonstop server j06.08.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "freeflow print server 82.d1.44",
"scope": null,
"trust": 0.3,
"vendor": "xerox",
"version": null
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.2.8"
},
{
"model": "communication server telephony manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "10003.0"
},
{
"model": "project openssl 0.9.8l",
"scope": null,
"trust": 0.3,
"vendor": "openssl",
"version": null
},
{
"model": "web server hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "03-10-09"
},
{
"model": "windows server r2 datacenter",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "windows server sp2 compute cluster",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "project openssl h",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.8"
},
{
"model": "cosminexus developer\u0027s kit for java",
"scope": "ne",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-50-01"
},
{
"model": "software opera web browser win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0.4"
},
{
"model": "nonstop server h06.15.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "project openssl i",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.8"
},
{
"model": "cosminexus primary server base",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "740.21"
},
{
"model": "sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4.223"
},
{
"model": "connect",
"scope": "ne",
"trust": 0.3,
"vendor": "kerio",
"version": "8.1"
},
{
"model": "web server hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-00-04"
},
{
"model": "nonstop server h06.23",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.3"
},
{
"model": "enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "5"
},
{
"model": "simatic rf615r",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "3.1"
},
{
"model": "java se sr7",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.0"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.20"
},
{
"model": "java se sr13-fp10",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "1.4.2"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.63"
},
{
"model": "windows xp professional edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "x64"
},
{
"model": "business server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "1x8664"
},
{
"model": "jdk update16",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "project openssl c",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.8"
},
{
"model": "windows home premium sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "7-x64"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.14"
},
{
"model": "nonstop server h06.22.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "groupware suite",
"scope": "ne",
"trust": 0.3,
"vendor": "collax",
"version": "5.5.12"
},
{
"model": "windows xp professional sp3",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.0.2.106"
},
{
"model": "jrockit r28.1.3",
"scope": null,
"trust": 0.3,
"vendor": "oracle",
"version": null
},
{
"model": "sdk .0 01",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.1"
},
{
"model": "windows vista home basic 64-bit edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "x64"
},
{
"model": "lotus domino",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.5"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "5.12"
},
{
"model": "windows server enterprise edition release candidate",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.020"
},
{
"model": "enterprise linux as for sap",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.1"
},
{
"model": "flex system integrated management module",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "2"
},
{
"model": "nonstop server h06.19.03",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "760.41"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.1"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.12.2"
},
{
"model": "windows vista home basic 64-bit edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "0"
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.05"
},
{
"model": "cosminexus",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.0"
},
{
"model": "networks matrixssl",
"scope": "eq",
"trust": 0.3,
"vendor": "peersec",
"version": "3.2.1"
},
{
"model": "websphere multichannel bank transformation toolkit",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.0"
},
{
"model": "interactive response",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"model": "windows for x64-based systems sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "7"
},
{
"model": "vplex geosynchrony",
"scope": "ne",
"trust": 0.3,
"vendor": "emc",
"version": "5.3"
},
{
"model": "messaging application server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "project openssl",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.5"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.16.3"
},
{
"model": "windows server r2 itanium sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "xcode",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.51"
},
{
"model": "nonstop server h06.21.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.0"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.8"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.3"
},
{
"model": "software opera web browser win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "5.11"
},
{
"model": "cosminexus client",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.212"
},
{
"model": "cosminexus http server",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.206"
},
{
"model": "cms server aux",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "15.0"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.3"
},
{
"model": "cosminexus http server windows",
"scope": "ne",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00-12"
},
{
"model": "nonstop server h06.19.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "web server windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "04-00"
},
{
"model": "freeflow print server 93.e0.21c",
"scope": null,
"trust": 0.3,
"vendor": "xerox",
"version": null
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "350.10"
},
{
"model": "simatic rf615r",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "3.2"
},
{
"model": "proactive contact",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.1.2"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.10"
},
{
"model": "mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.9"
},
{
"model": "cosminexus http server linux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "windows server r2 x64-standard",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "nonstop server j06.11.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "nonstop server h06.26.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "aura presence services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.1"
},
{
"model": "linux enterprise server sp1 for sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.43"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.26"
},
{
"model": "software opera web browser win32 beta",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "7.02"
},
{
"model": "access manager sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "3.1"
},
{
"model": "ucosminexus developer hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00"
},
{
"model": "websphere datapower soa appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.221"
},
{
"model": "nonstop server j06.04.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "jdk update",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.6.016"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.307"
},
{
"model": "windows xp",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "0"
},
{
"model": "jdk 1.5.0 07-b03",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.1"
},
{
"model": "voice portal",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1.1"
},
{
"model": "windows server r2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2008"
},
{
"model": "windows server datacenter edition itanium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "5.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.21"
},
{
"model": "software opera web browser win32",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0.2"
},
{
"model": "update manager",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "5.0"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.12.1"
},
{
"model": "project openssl e",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.8"
},
{
"model": "ucosminexus service platform",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "cosminexus http server linux",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00-10"
},
{
"model": "software opera web browser linux",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "5.0"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "350.40"
},
{
"model": "enterprise linux sap",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "nonstop server h06.20.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.19.5"
},
{
"model": "software opera web browser beta",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.201"
},
{
"model": "stenberg curl",
"scope": "eq",
"trust": 0.3,
"vendor": "daniel",
"version": "7.21.7"
},
{
"model": "nonstop server j06.10.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "websphere multichannel bank transformation toolkit",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.0.1"
},
{
"model": "ucosminexus application server standard-r",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "0"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "9.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.550.0"
},
{
"model": "windows vista enterprise",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "ucosminexus service platform windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "09-00(x64)"
},
{
"model": "nonstop server h06.16.02",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "software opera web browser linux",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "6.0.2"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1.3"
},
{
"model": "voice portal",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.1"
},
{
"model": "windows server sp2 enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.04"
},
{
"model": "jdk update22",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10.61"
},
{
"model": "software opera web browser",
"scope": "eq",
"trust": 0.3,
"vendor": "opera",
"version": "10"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "760.20"
},
{
"model": "windows xp media center edition sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "jdk update15",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.5.0"
},
{
"model": "project openssl beta1",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "communication server telephony manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "10004.0"
},
{
"model": "mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.8.2"
},
{
"model": "system management homepage",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.0.2"
},
{
"model": "power systems",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "730.91"
},
{
"model": "xcode",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "4.4"
},
{
"model": "freeflow print server 73.d2.33",
"scope": null,
"trust": 0.3,
"vendor": "xerox",
"version": null
},
{
"model": "project openssl m",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "database 11g release",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "111.1.0.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10.0.648.205"
},
{
"model": "project openssl b",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.2"
},
{
"model": "windows server datacenter edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.2"
},
{
"model": "nonstop server h06.25.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "project openssl j",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "windows server web edition sp1 beta",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20031"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.2"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#864643"
},
{
"db": "BID",
"id": "49778"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002305"
},
{
"db": "NVD",
"id": "CVE-2011-3389"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:google:chrome",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:mozilla:firefox",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:opera:opera_browser",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:vmware:esx",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:vmware:vcenter",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:vmware:virtualcenter",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:apple:apple_tv",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:iphone_os",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:apple:xcode",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:oracle:java_system_web_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:oracle:database_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:oracle:fusion_middleware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:oracle:http_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:oracle:hyperion",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:oracle:iplanet_web_proxy_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:oracle:iplanet_web_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:ruggedcom_win5100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:ruggedcom_win5200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:ruggedcom_win7000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:ruggedcom_win7200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hp:system_management_homepage",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:microsoft:internet_explorer",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:microsoft:windows_7",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:microsoft:windows_server_2003",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:microsoft:windows_server_2008",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:microsoft:windows_vista",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:microsoft:windows_xp",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:nec:infocage",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:nec:secureware_pki_application_development_kit",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:nec:websam_assetsuite",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:nec:websam_securemaster",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:cosminexus_application_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:cosminexus_client",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:cosminexus_developer",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:cosminexus_developers_kit_for_java",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:cosminexus_http_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:cosminexus_primary_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:cosminexus_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:cosminexus_studio",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:hirdb_for_java_xml",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:hitachi_developers_kit_for_java",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:device_manager",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:tuning_manager",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:hitachi_web_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:processing_kit_for_xml",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:ucosminexus_application_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:ucosminexus_client",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:ucosminexus_developer",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:ucosminexus_operator",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:ucosminexus_portal_framework",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:ucosminexus_primary_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:ucosminexus_service",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hitachi:ucosminexus_service_platform",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-002305"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Thai Duong and Juliano Rizzo, Wendy Parrington from United Utilities.",
"sources": [
{
"db": "BID",
"id": "49778"
}
],
"trust": 0.3
},
"cve": "CVE-2011-3389",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2011-3389",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2011-3389",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#864643",
"trust": 0.8,
"value": "3.38"
},
{
"author": "NVD",
"id": "CVE-2011-3389",
"trust": 0.8,
"value": "Medium"
},
{
"author": "VULMON",
"id": "CVE-2011-3389",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#864643"
},
{
"db": "VULMON",
"id": "CVE-2011-3389"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002305"
},
{
"db": "NVD",
"id": "CVE-2011-3389"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack. A vulnerability in the specification of the SSL 3.0 and TLS 1.0 protocols could allow an attacker to decrypt encrypted traffic. SSL Protocol and TLS The protocol includes CBC There are vulnerabilities that are subject to selective plaintext attacks in mode. SSL Protocol and TLS Protocol is CBC Initialization vector when operating in mode (IV) There is a problem in the determination method, and there is a vulnerability that is subject to selective plaintext attacks. Attack methods using this vulnerability have been released.Encrypted communication is a man-in-the-middle attack (man-in-the-middle attack) If they are intercepted by you, their content may be decrypted. This will result in a false sense of security, and potentially result in the disclosure of sensitive information. ----------------------------------------------------------------------\n\nSC World Congress, New York, USA, 16 November 2011\nVisit the Secunia booth (#203) and discover how you can improve your handling of third party programs:\n\nhttp://secunia.com/resources/events/sc_2011/ \n\n----------------------------------------------------------------------\n\nTITLE:\nIBM Lotus Domino SSL/TLS Initialization Vector Selection Weakness\n\nSECUNIA ADVISORY ID:\nSA46791\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/46791/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46791\n\nRELEASE DATE:\n2011-11-11\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/46791/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/46791/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46791\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA weakness has been reported in IBM Lotus Domino, which can be\nexploited by malicious people to disclose potentially sensitive\ninformation and hijack a user\u0027s session. \n\nFor more information:\nSA46168\n\nThe vulnerability is reported in versions 8.0, 8.5, 8.5.1, 8.5.2, and\n8.5.3. \n\nSOLUTION:\nAs a workaround enable RC4 encryption (please see the vendor\u0027s\nadvisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\nThai Duong and Juliano Rizzo\n\nORIGINAL ADVISORY:\nIBM:\nhttp://www.ibm.com/support/docview.wss?uid=swg21568229\n\nIBM ISS X-Force:\nhttp://xforce.iss.net/xforce/xfdb/70069\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n \n IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start\n applications and untrusted Java applets to affect confidentiality,\n integrity, and availability, related to AWT (CVE-2011-3548). \n \n IcedTea6 prior to 1.10.4 allows remote attackers to affect\n confidentiality, integrity, and availability via unknown vectors\n related to 2D (CVE-2011-3551). \n \n IcedTea6 prior to 1.10.4 allows remote attackers to affect integrity\n via unknown vectors related to Networking (CVE-2011-3552). \n \n IcedTea6 prior to 1.10.4 allows remote authenticated users to affect\n confidentiality, related to JAXWS (CVE-2011-3553). \n \n IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start\n applications and untrusted Java applets to affect confidentiality,\n integrity, and availability via unknown vectors related to Scripting\n (CVE-2011-3544). \n \n IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start\n applications and untrusted Java applets to affect confidentiality,\n integrity, and availability via unknown vectors related to\n Deserialization (CVE-2011-3521). \n \n IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start\n applications and untrusted Java applets to affect confidentiality,\n integrity, and availability via unknown vectors (CVE-2011-3554). \n \n IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start\n applications and untrusted Java applets to affect confidentiality\n via unknown vectors related to HotSpot (CVE-2011-3558). \n \n IcedTea6 prior to 1.10.4 allows remote attackers to affect\n confidentiality, integrity, and availability, related to RMI\n (CVE-2011-3556). \n \n IcedTea6 prior to 1.10.4 allows remote attackers to affect\n confidentiality, integrity, and availability, related to RMI\n (CVE-2011-3557). \n \n IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start\n applications and untrusted Java applets to affect confidentiality\n and integrity, related to JSSE (CVE-2011-3560). \n \n Deepak Bhole discovered a flaw in the Same Origin Policy (SOP)\n implementation in the IcedTea project Web browser plugin. A\n malicious applet could use this flaw to bypass SOP protection and\n open connections to any sub-domain of the second-level domain of\n the applet\u0026#039;s origin, as well as any sub-domain of the domain that\n is the suffix of the origin second-level domain. For example,\n IcedTea-Web plugin allowed applet from some.host.example.com to\n connect to other.host.example.com, www.example.com, and example.com,\n as well as www.ample.com or ample.com. (CVE-2011-3377). The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niD8DBQFOvSWxmqjQ0CJFipgRAnk1AKDUddZYCqwkfhoUpLxEL0BT3mDf0ACfbuTI\naaF2JGTyfceBABs92un/yVA=\n=yPsD\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n\nESA-2012-029: RSA BSAFE\\xae SSL-C Multiple Vulnerabilities \n\n\nEMC Identifier: ESA-2012-029\n\n\nCVE Identifier: CVE-2011-3389, CVE-2012-2110, CVE-2012-2131 \n\n\nSeverity Rating: See below for scores for individual issues \n\n\nAffected Products:\n\nAll versions of RSA BSAFE SSL-C prior to 2.8.6, all platforms\n\n\nUnaffected Products:\n\nRSA BSAFE SSL-C 2.8.6\n\n\nSummary:\n\n\nRSA BSAFE SSL-C 2.8.6 contains fixes designed to [prevent] BEAST attacks (CVE-2011-3389) and buffer overflow vulnerability (CVE-2012-2110/CVE-2012-2131). \n\n\n\n\nDetails:\n\nThis release includes fixes for the following vulnerabilities:\n\n1.BEAST (Browser Exploit Against SSL/TLS) attack (CVE-2011-3389\n\u003eThere is a known vulnerability in SSLv3 and TLS v1.0 to do with how the Initialization Vector (IV) is generated. For symmetric key algorithms in CBC mode, the IV for the first record is generated using keys and secrets set during the SSL or TLS handshake. All subsequent records are encrypted using the ciphertext block from the previous record as the IV. With symmetric key encryption in CBC mode, plain text encrypted with the same IV and key generates the same cipher text, which is why having a variable IV is important. \nThe BEAST exploit uses this SSLv3 and TLS v1.0 vulnerability by allowing an attacker to observe the last ciphertext block, which is the IV, then replace this with an IV of their choice, inject some of their own plain text data, and when this new IV is used to encrypt the data, the attacker can guess the plain text data one byte at a time. \nCVSSv2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)\n2.Buffer overflow vulnerability (CVE-2012-2110/CVE-2012-2131)\nSSL-C contains code that does not properly interpret integer data, which could allow buffer overflow attacks using crafted DER (Distinguished Encoding Rules) data, such as in X.509 certificate or an RSA asymmetric key. \nCVSSv2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)\n\n\nRecommendation:\n\nFor BEAST (Browser Exploit Against SSL/TLS) attack:\nThe best way to help prevent this attack is to use TLS v1.1. The vulnerability to do with IV generation was fixed in TLS v1.1 (released in 2006) so implementations using only TLS v1.1 are engineered to be secure against the BEAST exploit. However, support for this higher level protocol is limited to a smaller number of applications, so supporting only TLS v1.1 might cause interoperability issues. \n\nA second solution is to limit the negotiated cipher suites to exclude those that do not require symmetric key algorithms in CBC mode. However, this substantially restricts the number of cipher suites that can be negotiated. That is, only cipher suites with NULL encryption or cipher suites with streaming encryption algorithms (the RC4 algorithm) could be negotiated. \n\nIn RSA BSAFE SSL-C 2.8.6, the BEAST exploit is prevented by introducing some unknown data into the encryption scheme, prior to the attackers inserted plain text data. This is done as follows: \n\n1.The first plain text block to be encrypted is split into two blocks. The first block contains the first byte of the data, the second block contains the rest. \n2.A MAC is generated from the one byte of data, the MAC key, and an increasing counter. This MAC is included in the first block. \n3.The one byte of data, along with the MAC, is encrypted and becomes the IV for the next block. Because the IV is now essentially random data, it is impossible for an attacker to predict it and replace it with one of their own. \nTo manage this first block splitting in RSA BSAFE SSL-C 2.8.6, either for an SSL context or SSL object, call R_SSL_CTX_set_options() or R_SSL_set_options() respectively, with the SSL_OP_SPLIT_FIRST_FRAGMENT identifier, this option is enabled by default. \n\nFor more information about these functions and identifiers, see the RSA BSAFE SSL-C 2.8.6 API Reference Guide. \n\nFor Buffer Overflow vulnerability:\nRSA strongly recommends that RSA BSAFE SSL-C customers upgrade to RSA BSAFE SSL-C 2.8.6 that contains upgrades designed to resolve this issue. RSA recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. \n\n\nObtaining Documentation:\n\nTo obtain RSA documentation, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose documentation you want to obtain. Scroll to the section for the product version that you want and click the set link. \n\n\n\nObtaining More Information:\n\nFor more information about RSA BSAFE, visit the RSA web site at http://www.rsa.com/node.aspx?id=1204. \n\n\n\nGetting Support and Service:\n\nFor customers with current maintenance contracts, contact your local RSA Customer Support center with any additional questions regarding this RSA SecurCare Note. For contact telephone numbers or e-mail addresses, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help \u0026 Contact, and then click the Contact Us - Phone tab or the Contact Us - Email tab. \n\n\nGeneral Customer Support Information:\n\nhttp://www.rsa.com/node.aspx?id=1264\n\n\nRSA SecurCare Online:\n\nhttps://knowledge.rsasecurity.com\n\n\nEOPS Policy:\n\nRSA has a defined End of Primary Support policy associated with all major versions. Please refer to the link below for additional details. \nhttp://www.rsa.com/node.aspx?id=2575\n\n\nSecurCare Online Security Advisories\n\nRSA, The Security Division of EMC, distributes SCOL Security Advisories in order to bring to the attention of users of the affected RSA products important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided \"as is\" without warranty of any kind. RSA disclaim all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall RSA or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. \n\n\nAbout RSA SecurCare Notes \u0026 Security Advisories Subscription\n\nRSA SecurCare Notes \u0026 Security Advisories are targeted e-mail messages that RSA sends you based on the RSA product family you currently use. If you\\x92d like to stop receiving RSA SecurCare Notes \u0026 Security Advisories, or if you\\x92d like to change which RSA product family Notes \u0026 Security Advisories you currently receive, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3. Following the instructions on the page, remove the check mark next to the RSA product family whose Notes \u0026 Security Advisories you no longer want to receive. Click the Submit button to save your selection. \n\nDetails: \nUnisphere Central requires an update to address various security vulnerabilities:\n\n1. \tUnvalidated Redirect Vulnerability (CVE-2015-0512)\n\nA potential vulnerability in Unisphere Central may allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks. The attacker can specify the location of the arbitrary site in the unvalidated parameter of a crafted URL. If this URL is accessed, the browser is redirected to the arbitrary site specified in the parameter. \n\nCVSSv2 Base Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n2. \tMultiple Embedded Component Vulnerabilities\n\nThe following vulnerabilities affecting multiple embedded components were addressed:\n\n\\x95\tPostgreSQL (CVE-2013-1899, CVE-2013-1900, CVE-2013-1901, CVE-2013-1902)\n\\x95\tApache Tomcat HTTP Digest Access Bypass (CVE-2012-5885)\n\\x95\tSSL3.0/TLS1.0 Weak CBC Mode Vulnerability (CVE-2011-3389)\n\\x95\tSUSE Kernel Updates (CVE-2013-1767, CVE-2012-2137, CVE-2012-6548, CVE-2013-1797, CVE-2013-0231,CVE-2013-1774, CVE-2013-1848, CVE-2013-0311, CVE-2013-2634, CVE-2013-0268, CVE-2013-0913, CVE-2013-1772, CVE-2013-0216, CVE-2013-1792, CVE-2012-6549, CVE-2013-2635, CVE-2013-0914, CVE-2013-1796, CVE-2013-0160, CVE-2013-1860, CVE-2013-0349, CVE-2013-1798)\n\\x95\tLibgcrypt (CVE-2013-4242)\n\\x95\tcURL/libcURL Multiple Vulnerabilities (CVE-2014-0138, CVE-2014-0139, CVE-2014-0015, CVE-2014-3613, CVE-2014-3620)\n\\x95\tOpenSSL Multiple Vulnerabilities (CVE-2010-5298, CVE-2014-0076, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470, CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139, CVE-2014-3513, CVE-2014-3567, CVE-2014-3568, CVE-2014-3566)\n\\x95\tGNU Privacy Guard (GPG2) Update (CVE-2012-6085)\n\\x95\tJava Runtime Environment (CVE-2014-2403, CVE-2014-0446, CVE-2014-0457, CVE-2014-0453, CVE-2014-2412, CVE-2014-2398, CVE-2014-0458, CVE-2014-2397, CVE-2014-0460, CVE-2014-0429, CVE-2014-2428, CVE-2014-2423, CVE-2014-2420, CVE-2014-0448, CVE-2014-0459, CVE-2014-2427, CVE-2014-2414, CVE-2014-0461, CVE-2014-0454, CVE-2014-2422, CVE-2014-0464, CVE-2014-2401, CVE-2014-0456, CVE-2014-0455, CVE-2014-0451, CVE-2014-0449, CVE-2014-0432, CVE-2014-0463, CVE-2014-2410, CVE-2014-2413, CVE-2014-2421, CVE-2014-2409, CVE-2014-2402, CVE-2014-0452, CVE-2014-4220, CVE-2014-2490, CVE-2014-4266, CVE-2014-4219, CVE-2014-2483, CVE-2014-4263, CVE-2014-4264, CVE-2014-4268, CVE-2014-4252, CVE-2014-4223, CVE-2014-4247, CVE-2014-4218, CVE-2014-4221, CVE-2014-4262, CVE-2014-4227, CVE-2014-4208, CVE-2014-4209, CVE-2014-4265, CVE-2014-4244, CVE-2014-4216)\n\\x95\tOpenSSH Denial of Service (CVE-2010-5107)\n\\x95\tNetwork Security Services (NSS) Update (CVE-2014-1545, CVE-2014-1541, CVE-2014-1534, CVE-2014-1533, CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)\n\\x95\t Xorg-X11 Update (CVE-2013-2005, CVE-2013-2002)\n\\x95\tGnuTLS SSL Verification Vulnerability (CVE-2014-0092)\n\\x95\tPango Security Update (CVE-2011-0020, CVE-2011-0064)\n\\x95\tD-Bus Denial of Service (CVE-2014-3638,CVE-2014-3639)\n\\x95\tPerl Denial of Service (CVE-2014-4330)\nCVSSv2 Base Score: Refer to NVD (http://nvd.nist.gov) for individual scores for each CVE listed above\n\nFor more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the NVD database\\x92s search utility at http://web.nvd.nist.gov/view/vuln/search\n\nResolution: \nThe following Unisphere Central release contains resolutions to the above issues:\n\\x95\tUnisphere Central version 4.0. \n\nEMC strongly recommends all customers upgrade at the earliest opportunity. Contact EMC Unisphere Central customer support to download the required upgrades. \n\nLink to remedies:\nRegistered EMC Online Support customers can download patches and software from support.emc.com at: https://support.emc.com/products/28224_Unisphere-Central\n\n\nIf you have any questions, please contact EMC Support. \n\nRead and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. A work-around has been added to mitigate\n the problem (CVE-2011-3389). \n \n curl is vulnerable to a data injection attack for certain protocols\n through control characters embedded or percent-encoded in URLs\n (CVE-2012-0036). \n _______________________________________________________________________\n\n Problem Description:\n\n Multiple vulnerabilities has been discovered and corrected in python:\n \n The _ssl module would always disable the CBC IV attack countermeasure\n (CVE-2011-3389). \n \n A race condition was found in the way the Python distutils module\n set file permissions during the creation of the .pypirc file. If a\n local user had access to the home directory of another user who is\n running distutils, they could use this flaw to gain access to that\n user\u0026#039;s .pypirc file, which can contain usernames and passwords for\n code repositories (CVE-2011-4944). \n \n A flaw was found in the way the Python SimpleXMLRPCServer module\n handled clients disconnecting prematurely. \n \n Hash table collisions CPU usage DoS for the embedded copy of expat\n (CVE-2012-0876). \n \n A denial of service flaw was found in the implementation of associative\n arrays (dictionaries) in Python. An attacker able to supply a large\n number of inputs to a Python application (such as HTTP POST request\n parameters sent to a web application) that are used as keys when\n inserting data into an array could trigger multiple hash function\n collisions, making array operations take an excessive amount of\n CPU time. To mitigate this issue, randomization has been added to\n the hash function to reduce the chance of an attacker successfully\n causing intentional collisions (CVE-2012-1150). -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: java-1.6.0-openjdk security update\nAdvisory ID: RHSA-2011:1380-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2011-1380.html\nIssue date: 2011-10-18\nCVE Names: CVE-2011-3389 CVE-2011-3521 CVE-2011-3544 \n CVE-2011-3547 CVE-2011-3548 CVE-2011-3551 \n CVE-2011-3552 CVE-2011-3553 CVE-2011-3554 \n CVE-2011-3556 CVE-2011-3557 CVE-2011-3558 \n CVE-2011-3560 \n=====================================================================\n\n1. Summary:\n\nUpdated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5 and 6. \n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5 server) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nThese packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit. \n\nA flaw was found in the Java RMI (Remote Method Invocation) registry\nimplementation. A remote RMI client could use this flaw to execute\narbitrary code on the RMI server running the registry. (CVE-2011-3556)\n\nA flaw was found in the Java RMI registry implementation. A remote RMI\nclient could use this flaw to execute code on the RMI server with\nunrestricted privileges. (CVE-2011-3557)\n\nA flaw was found in the IIOP (Internet Inter-Orb Protocol) deserialization\ncode. An untrusted Java application or applet running in a sandbox could\nuse this flaw to bypass sandbox restrictions by deserializing\nspecially-crafted input. (CVE-2011-3521)\n\nIt was found that the Java ScriptingEngine did not properly restrict the\nprivileges of sandboxed applications. An untrusted Java application or\napplet running in a sandbox could use this flaw to bypass sandbox\nrestrictions. (CVE-2011-3544)\n\nA flaw was found in the AWTKeyStroke implementation. An untrusted Java\napplication or applet running in a sandbox could use this flaw to bypass\nsandbox restrictions. (CVE-2011-3548)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the Java2D code used to perform transformations of graphic shapes\nand images. An untrusted Java application or applet running in a sandbox\ncould use this flaw to bypass sandbox restrictions. (CVE-2011-3551)\n\nAn insufficient error checking flaw was found in the unpacker for JAR files\nin pack200 format. A specially-crafted JAR file could use this flaw to\ncrash the Java Virtual Machine (JVM) or, possibly, execute arbitrary code\nwith JVM privileges. (CVE-2011-3554)\n\nIt was found that HttpsURLConnection did not perform SecurityManager checks\nin the setSSLSocketFactory method. An untrusted Java application or applet\nrunning in a sandbox could use this flaw to bypass connection restrictions\ndefined in the policy. An attacker able to perform a\nchosen plain text attack against a connection mixing trusted and untrusted\ndata could use this flaw to recover portions of the trusted data sent over\nthe connection. (CVE-2011-3389)\n\nNote: This update mitigates the CVE-2011-3389 issue by splitting the first\napplication data record byte to a separate SSL/TLS protocol record. This\nmitigation may cause compatibility issues with some SSL/TLS implementations\nand can be disabled using the jsse.enableCBCProtection boolean property. \nThis can be done on the command line by appending the flag\n\"-Djsse.enableCBCProtection=false\" to the java command. \n\nAn information leak flaw was found in the InputStream.skip implementation. \nAn untrusted Java application or applet could possibly use this flaw to\nobtain bytes skipped by other threads. (CVE-2011-3547)\n\nA flaw was found in the Java HotSpot virtual machine. An untrusted Java\napplication or applet could use this flaw to disclose portions of the VM\nmemory, or cause it to crash. (CVE-2011-3558)\n\nThe Java API for XML Web Services (JAX-WS) implementation in OpenJDK was\nconfigured to include the stack trace in error messages sent to clients. A\nremote client could possibly use this flaw to obtain sensitive information. \n(CVE-2011-3553)\n\nIt was found that Java applications running with SecurityManager\nrestrictions were allowed to use too many UDP sockets by default. If\nmultiple instances of a malicious application were started at the same\ntime, they could exhaust all available UDP sockets on the system. \n(CVE-2011-3552)\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.9.10. Refer to\nthe NEWS file, linked to in the References, for further information. \n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n737506 - CVE-2011-3389 HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)\n745379 - CVE-2011-3560 OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)\n745387 - CVE-2011-3547 OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)\n745391 - CVE-2011-3551 OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)\n745397 - CVE-2011-3552 OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)\n745399 - CVE-2011-3544 OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)\n745442 - CVE-2011-3521 OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)\n745447 - CVE-2011-3554 OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)\n745459 - CVE-2011-3556 OpenJDK: RMI DGC server remote code execution (RMI, 7077466)\n745464 - CVE-2011-3557 OpenJDK: RMI registry privileged code execution (RMI, 7083012)\n745473 - CVE-2011-3548 OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)\n745476 - CVE-2011-3553 OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)\n745492 - CVE-2011-3558 OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-3389.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3521.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3544.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3547.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3548.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3551.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3552.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3553.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3554.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3556.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3557.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3558.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3560.html\nhttps://access.redhat.com/security/updates/classification/#critical\nhttp://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html\nhttp://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFOngvzXlSAg2UNWIIRArb8AKCaS923HYBco1E2eOOedT1aefjmyACgherU\n1E1DMZpv3ExBmKhD4Emi2no=\n=sMXo\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-3389"
},
{
"db": "CERT/CC",
"id": "VU#864643"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002305"
},
{
"db": "BID",
"id": "49778"
},
{
"db": "VULMON",
"id": "CVE-2011-3389"
},
{
"db": "PACKETSTORM",
"id": "106901"
},
{
"db": "PACKETSTORM",
"id": "106868"
},
{
"db": "PACKETSTORM",
"id": "116431"
},
{
"db": "PACKETSTORM",
"id": "108498"
},
{
"db": "PACKETSTORM",
"id": "130188"
},
{
"db": "PACKETSTORM",
"id": "111851"
},
{
"db": "PACKETSTORM",
"id": "114007"
},
{
"db": "PACKETSTORM",
"id": "105967"
}
],
"trust": 3.42
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#864643",
"trust": 2.9
},
{
"db": "NVD",
"id": "CVE-2011-3389",
"trust": 2.9
},
{
"db": "ICS CERT",
"id": "ICSMA-18-058-02",
"trust": 1.8
},
{
"db": "USCERT",
"id": "TA12-010A",
"trust": 1.8
},
{
"db": "SIEMENS",
"id": "SSA-556833",
"trust": 1.3
},
{
"db": "BID",
"id": "49778",
"trust": 1.3
},
{
"db": "ICS CERT",
"id": "ICSA-19-192-04",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "48948",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "49198",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "55351",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "48915",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "55322",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "48256",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "48692",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "45791",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "55350",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "47998",
"trust": 1.0
},
{
"db": "SECTRACK",
"id": "1026704",
"trust": 1.0
},
{
"db": "SECTRACK",
"id": "1026103",
"trust": 1.0
},
{
"db": "SECTRACK",
"id": "1029190",
"trust": 1.0
},
{
"db": "SECTRACK",
"id": "1025997",
"trust": 1.0
},
{
"db": "OSVDB",
"id": "74829",
"trust": 1.0
},
{
"db": "BID",
"id": "49388",
"trust": 1.0
},
{
"db": "JVN",
"id": "JVNVU95174988",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU95868425",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-14-098-03",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002305",
"trust": 0.8
},
{
"db": "XF",
"id": "70069",
"trust": 0.4
},
{
"db": "HITACHI",
"id": "HS14-011",
"trust": 0.3
},
{
"db": "HITACHI",
"id": "HS11-024",
"trust": 0.3
},
{
"db": "HITACHI",
"id": "HS13-018",
"trust": 0.3
},
{
"db": "SECUNIA",
"id": "46791",
"trust": 0.2
},
{
"db": "VULMON",
"id": "CVE-2011-3389",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "106901",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "106868",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "116431",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "108498",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "130188",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "111851",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "114007",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "105967",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#864643"
},
{
"db": "VULMON",
"id": "CVE-2011-3389"
},
{
"db": "BID",
"id": "49778"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002305"
},
{
"db": "PACKETSTORM",
"id": "106901"
},
{
"db": "PACKETSTORM",
"id": "106868"
},
{
"db": "PACKETSTORM",
"id": "116431"
},
{
"db": "PACKETSTORM",
"id": "108498"
},
{
"db": "PACKETSTORM",
"id": "130188"
},
{
"db": "PACKETSTORM",
"id": "111851"
},
{
"db": "PACKETSTORM",
"id": "114007"
},
{
"db": "PACKETSTORM",
"id": "105967"
},
{
"db": "NVD",
"id": "CVE-2011-3389"
}
]
},
"id": "VAR-201109-0130",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.3386243433333333
},
"last_update_date": "2024-11-28T21:21:08.101000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APPLE-SA-2013-10-22-3 ",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"title": "APPLE-SA-2012-07-25-2 Xcode 4.4",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html"
},
{
"title": "APPLE-SA-2012-09-19-2",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
},
{
"title": "APPLE-SA-2012-05-09-1",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"title": "APPLE-SA-2012-02-01-1",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"title": "APPLE-SA-2014-02-25-1",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce/2014/Feb/msg00000.html"
},
{
"title": "APPLE-SA-2011-10-12-2",
"trust": 0.8,
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html"
},
{
"title": "APPLE-SA-2011-10-12-1",
"trust": 0.8,
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"title": "HT5281",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5281?viewlocale=ja_JP"
},
{
"title": "HT5416",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5416?viewlocale=ja_JP"
},
{
"title": "HT6011",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT6011?viewlocale=ja_JP"
},
{
"title": "HT5130",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5130?viewlocale=ja_JP"
},
{
"title": "HT5501",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5501?viewlocale=ja_JP"
},
{
"title": "HT6150",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT6150?viewlocale=ja_JP"
},
{
"title": "HT4999",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT4999?viewlocale=ja_JP"
},
{
"title": "HT5001",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5001?viewlocale=ja_JP"
},
{
"title": "HT5045",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5045?viewlocale=ja_JP"
},
{
"title": "chrome-stable-release",
"trust": 0.8,
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"title": "Revision 97269",
"trust": 0.8,
"url": "https://src.chromium.org/viewvc/chrome?view=rev\u0026revision=97269"
},
{
"title": "HS14-010",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-010/index.html"
},
{
"title": "HS15-031",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS15-031/index.html"
},
{
"title": "HS13-018",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-018/index.html"
},
{
"title": "HS14-011",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-011/index.html"
},
{
"title": "HS11-024",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-024/index.html"
},
{
"title": "HPSBMU02900",
"trust": 0.8,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"title": "HPSBMU02742 SSRT100740",
"trust": 0.8,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03164351"
},
{
"title": "HPSBUX02730 SSRT100710",
"trust": 0.8,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03122753"
},
{
"title": "Security alerts",
"trust": 0.8,
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"title": "2588513",
"trust": 0.8,
"url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx"
},
{
"title": "2588513",
"trust": 0.8,
"url": "http://technet.microsoft.com/en-us/security/advisory/2588513"
},
{
"title": "MS12-006",
"trust": 0.8,
"url": "http://technet.microsoft.com/en-us/security/bulletin/ms12-006"
},
{
"title": "TLS \u6697\u53f7\u5316\u901a\u4fe1\u306b\u5bfe\u3059\u308b\u653b\u6483\u306e Firefox \u3078\u306e\u5f71\u97ff",
"trust": 0.8,
"url": "http://mozilla.jp/blog/entry/7289/"
},
{
"title": "attack-against-tls-protected-communications",
"trust": 0.8,
"url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/"
},
{
"title": "NV12-005",
"trust": 0.8,
"url": "http://jpn.nec.com/security-info/secinfo/nv12-005.html"
},
{
"title": "Bug 719047",
"trust": 0.8,
"url": "https://bugzilla.novell.com/show_bug.cgi?id=719047"
},
{
"title": "Security of CBC Ciphersuites in SSL/TLS: Problems and Countermeasures",
"trust": 0.8,
"url": "https://www.openssl.org/~bodo/tls-cbc.txt"
},
{
"title": "SUSE-SU-2012:0114",
"trust": 0.8,
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
},
{
"title": "SUSE-SU-2012:0122",
"trust": 0.8,
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html"
},
{
"title": "openSUSE-SU-2012:0030",
"trust": 0.8,
"url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00009.html"
},
{
"title": "openSUSE-SU-2012:0063",
"trust": 0.8,
"url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00021.html"
},
{
"title": "windows/1160",
"trust": 0.8,
"url": "http://www.opera.com/docs/changelogs/windows/1160/"
},
{
"title": "unix/1160",
"trust": 0.8,
"url": "http://www.opera.com/docs/changelogs/unix/1160/"
},
{
"title": "mac/1160",
"trust": 0.8,
"url": "http://www.opera.com/docs/changelogs/mac/1160/"
},
{
"title": "javacpuoct2011-443431",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"title": "Oracle Critical Patch Update Advisory - January 2015",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"title": "Text Form of Oracle Critical Patch Update - January 2015 Risk Matrices",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015verbose-1972976.html"
},
{
"title": "Oracle Critical Patch Update Advisory - July 2015",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"title": "Oracle Critical Patch Update Advisory - October 2013",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"title": "Text Form of Oracle Critical Patch Update - July 2015 Risk Matrices",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015verbose-2367947.html"
},
{
"title": "Text Form of Oracle Critical Patch Update - October 2013 Risk Matrices",
"trust": 0.8,
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013verbose-1899842.html"
},
{
"title": "Bug 737506",
"trust": 0.8,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"title": "RHSA-2011:1384",
"trust": 0.8,
"url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html"
},
{
"title": "RHSA-2012:0006",
"trust": 0.8,
"url": "http://rhn.redhat.com/errata/RHSA-2012-0006.html"
},
{
"title": "RHSA-2013:1455",
"trust": 0.8,
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"title": "October 2013 Critical Patch Update Released",
"trust": 0.8,
"url": "https://blogs.oracle.com/security/entry/october_2013_critical_patch_update"
},
{
"title": "cve_2011_3389_chosen_plaintext1",
"trust": 0.8,
"url": "http://blogs.oracle.com/sunsecurity/entry/cve_2011_3389_chosen_plaintext1"
},
{
"title": "CVE-2011-3389 Vulnerability in NSS library affects Oracle iPlanet Web Proxy Server",
"trust": 0.8,
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_3389_vulnerability_in"
},
{
"title": "Multiple vulnerabilities in Python",
"trust": 0.8,
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_python"
},
{
"title": "January 2015 Critical Patch Update Released",
"trust": 0.8,
"url": "https://blogs.oracle.com/security/entry/january_2015_critical_patch_update"
},
{
"title": "Multiple vulnerabilities in fetchmail",
"trust": 0.8,
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"title": "July 2015 Critical Patch Update Released",
"trust": 0.8,
"url": "https://blogs.oracle.com/security/entry/july_2015_critical_patch_update"
},
{
"title": "cve_2011_3389_chosen_plaintext",
"trust": 0.8,
"url": "http://blogs.oracle.com/sunsecurity/entry/cve_2011_3389_chosen_plaintext"
},
{
"title": "2588513",
"trust": 0.8,
"url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx"
},
{
"title": "VMSA-2012-0003.1",
"trust": 0.8,
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0003.html"
},
{
"title": "HS14-010",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS14-010/index.html"
},
{
"title": "HS15-031",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS15-031/index.html"
},
{
"title": "HS13-018",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS13-018/index.html"
},
{
"title": "HS14-011",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS14-011/index.html"
},
{
"title": "HS11-024",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-024/index.html"
},
{
"title": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a2\u30c9\u30d0\u30a4\u30b6\u30ea (2588513)",
"trust": 0.8,
"url": "https://technet.microsoft.com/ja-jp/security/advisory/2588513"
},
{
"title": "MS12-006",
"trust": 0.8,
"url": "http://technet.microsoft.com/ja-jp/security/bulletin/ms12-006"
},
{
"title": "TA12-010A",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta12-010a.html"
},
{
"title": "Debian CVElist Bug Report Logs: CVE-2011-4362: DoS because of incorrect code in src/http_auth.c:67",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=210cf4b6236578faf8f94374acf42746"
},
{
"title": "Debian CVElist Bug Report Logs: nss: CVE-2014-1569 information leak",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=ab91355beed7b295ca76667e7725b8ff"
},
{
"title": "Red Hat: Critical: java-1.4.2-ibm security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20120006 - Security Advisory"
},
{
"title": "Debian Security Advisories: DSA-2398-2 curl -- several vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=aedc7511d582d3d92a5ba7329ed7d34e"
},
{
"title": "Red Hat: Moderate: java-1.4.2-ibm-sap security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20120343 - Security Advisory"
},
{
"title": "Debian Security Advisories: DSA-2368-1 lighttpd -- multiple vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=013e897d92ab510d8719f5ffc2cb7e80"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=43a9f1e298f8daf772ebfe7187e61853"
},
{
"title": "Debian CVElist Bug Report Logs: asterisk: CVE-2015-3008: TLS Certificate Common name NULL byte exploit",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3dcc7cafafedb5ec8b84970acf17457b"
},
{
"title": "Red Hat: Critical: java-1.6.0-ibm security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20120034 - Security Advisory"
},
{
"title": "Debian CVElist Bug Report Logs: asterisk: chan_sip: File descriptors leak (UDP sockets) / AST-2016-007, CVE-2016-7551",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=84da1980846b47c2025a829646fab2ad"
},
{
"title": "Red Hat: Critical: thunderbird security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20121089 - Security Advisory"
},
{
"title": "Ubuntu Security Notice: openjdk-6, openjdk-6b18 regression",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1263-2"
},
{
"title": "Red Hat: Critical: firefox security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20121088 - Security Advisory"
},
{
"title": "Ubuntu Security Notice: icedtea-web, openjdk-6, openjdk-6b18 vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1263-1"
},
{
"title": "Debian Security Advisories: DSA-2356-1 openjdk-6 -- several vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=a48d7ee302b835c97c950b74a371fcfe"
},
{
"title": "Amazon Linux AMI: ALAS-2011-010",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2011-010"
},
{
"title": "IBM: IBM Security Bulletin: IBM Cognos Controller 2019Q2 Security Updater: Multiple vulnerabilities have been identified in IBM Cognos Controller",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=38227211accce022b0a3d9b56a974186"
},
{
"title": "Oracle: Oracle Critical Patch Update Advisory - July 2015",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=459961024c4bdce7bb3a1a40a65a6f2e"
},
{
"title": "Oracle: Oracle Critical Patch Update Advisory - January 2015",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=4a692d6d60aa31507cb101702b494c51"
},
{
"title": "Red Hat: Low: Red Hat Network Satellite server IBM Java Runtime security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20131455 - Security Advisory"
},
{
"title": "litecoin_demo",
"trust": 0.1,
"url": "https://github.com/swod00/litecoin_demo "
},
{
"title": "litecoin",
"trust": 0.1,
"url": "https://github.com/daniel1302/litecoin "
},
{
"title": "reg",
"trust": 0.1,
"url": "https://github.com/genuinetools/reg "
},
{
"title": "testssl-report",
"trust": 0.1,
"url": "https://github.com/tzaffi/testssl-report "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/ricardobranco777/regview "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/Valdem88/dev-17_ib-yakovlev_vs "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2011-3389"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002305"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-326",
"trust": 1.0
},
{
"problemtype": "CWE-20",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-002305"
},
{
"db": "NVD",
"id": "CVE-2011-3389"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx"
},
{
"trust": 2.1,
"url": "http://www.kb.cert.org/vuls/id/864643"
},
{
"trust": 1.8,
"url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html"
},
{
"trust": 1.8,
"url": "http://vnhacker.blogspot.com/2011/09/beast.html"
},
{
"trust": 1.8,
"url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx"
},
{
"trust": 1.8,
"url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html"
},
{
"trust": 1.8,
"url": "http://www.us-cert.gov/cas/techalerts/ta12-010a.html"
},
{
"trust": 1.7,
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"trust": 1.6,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03839862"
},
{
"trust": 1.4,
"url": "http://curl.haxx.se/docs/adv_20120124b.html"
},
{
"trust": 1.4,
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"trust": 1.3,
"url": "http://www.opera.com/docs/changelogs/windows/1160/"
},
{
"trust": 1.3,
"url": "http://www.opera.com/support/kb/view/1004/"
},
{
"trust": 1.3,
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"trust": 1.3,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
},
{
"trust": 1.1,
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=665814"
},
{
"trust": 1.1,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-192-04"
},
{
"trust": 1.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3389"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/55350"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"trust": 1.0,
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"trust": 1.0,
"url": "http://technet.microsoft.com/security/advisory/2588513"
},
{
"trust": 1.0,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"trust": 1.0,
"url": "http://www.securitytracker.com/id/1029190"
},
{
"trust": 1.0,
"url": "http://lists.apple.com/archives/security-announce/2012/jul/msg00001.html"
},
{
"trust": 1.0,
"url": "http://rhn.redhat.com/errata/rhsa-2012-0508.html"
},
{
"trust": 1.0,
"url": "http://downloads.asterisk.org/pub/security/ast-2016-001.html"
},
{
"trust": 1.0,
"url": "http://lists.apple.com/archives/security-announce/2012/may/msg00001.html"
},
{
"trust": 1.0,
"url": "http://isc.sans.edu/diary/ssl+tls+part+3+/11635"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"trust": 1.0,
"url": "http://lists.apple.com/archives/security-announce/2013/oct/msg00004.html"
},
{
"trust": 1.0,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14752"
},
{
"trust": 1.0,
"url": "http://eprint.iacr.org/2004/111"
},
{
"trust": 1.0,
"url": "https://ics-cert.us-cert.gov/advisories/icsma-18-058-02"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/bid/49778"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
},
{
"trust": 1.0,
"url": "http://www.redhat.com/support/errata/rhsa-2012-0006.html"
},
{
"trust": 1.0,
"url": "http://www.securitytracker.com/id?1025997"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"trust": 1.0,
"url": "http://lists.apple.com/archives/security-announce/2012/feb/msg00000.html"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/48692"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/48256"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/47998"
},
{
"trust": 1.0,
"url": "http://eprint.iacr.org/2006/136"
},
{
"trust": 1.0,
"url": "http://lists.apple.com/archives/security-announce/2012/sep/msg00004.html"
},
{
"trust": 1.0,
"url": "http://www.apcmedia.com/salestools/sjhn-7rkgnm/sjhn-7rkgnm_r4_en.pdf"
},
{
"trust": 1.0,
"url": "http://www.opera.com/docs/changelogs/unix/1160/"
},
{
"trust": 1.0,
"url": "http://support.apple.com/kb/ht6150"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/55322"
},
{
"trust": 1.0,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:058"
},
{
"trust": 1.0,
"url": "https://hermes.opensuse.org/messages/13154861"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/48948"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html"
},
{
"trust": 1.0,
"url": "http://rhn.redhat.com/errata/rhsa-2013-1455.html"
},
{
"trust": 1.0,
"url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue"
},
{
"trust": 1.0,
"url": "http://lists.apple.com/archives/security-announce/2011//oct/msg00002.html"
},
{
"trust": 1.0,
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"trust": 1.0,
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"trust": 1.0,
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/49198"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
},
{
"trust": 1.0,
"url": "http://support.apple.com/kb/ht5501"
},
{
"trust": 1.0,
"url": "http://support.apple.com/kb/ht5001"
},
{
"trust": 1.0,
"url": "http://www.securitytracker.com/id?1026103"
},
{
"trust": 1.0,
"url": "https://hermes.opensuse.org/messages/13155432"
},
{
"trust": 1.0,
"url": "http://support.apple.com/kb/ht4999"
},
{
"trust": 1.0,
"url": "http://www.opera.com/docs/changelogs/mac/1160/"
},
{
"trust": 1.0,
"url": "http://osvdb.org/74829"
},
{
"trust": 1.0,
"url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/"
},
{
"trust": 1.0,
"url": "http://www.ubuntu.com/usn/usn-1263-1"
},
{
"trust": 1.0,
"url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
},
{
"trust": 1.0,
"url": "http://www.redhat.com/support/errata/rhsa-2011-1384.html"
},
{
"trust": 1.0,
"url": "http://lists.apple.com/archives/security-announce/2011//oct/msg00001.html"
},
{
"trust": 1.0,
"url": "http://support.apple.com/kb/ht5281"
},
{
"trust": 1.0,
"url": "http://ekoparty.org/2011/juliano-rizzo.php"
},
{
"trust": 1.0,
"url": "http://www.insecure.cl/beast-ssl.rar"
},
{
"trust": 1.0,
"url": "http://www.securitytracker.com/id?1026704"
},
{
"trust": 1.0,
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/45791"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/55351"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/48915"
},
{
"trust": 1.0,
"url": "https://bugzilla.novell.com/show_bug.cgi?id=719047"
},
{
"trust": 1.0,
"url": "http://www.opera.com/docs/changelogs/unix/1151/"
},
{
"trust": 1.0,
"url": "http://www.debian.org/security/2012/dsa-2398"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/bid/49388"
},
{
"trust": 1.0,
"url": "http://support.apple.com/kb/ht5130"
},
{
"trust": 1.0,
"url": "http://www.opera.com/docs/changelogs/mac/1151/"
},
{
"trust": 1.0,
"url": "http://www.opera.com/docs/changelogs/windows/1151/"
},
{
"trust": 0.8,
"url": "http://www.openssl.org/~bodo/tls-cbc.txt"
},
{
"trust": 0.8,
"url": "http://www.phonefactor.com/blog/slaying-beast-mitigating-the-latest-ssltls-vulnerability.php"
},
{
"trust": 0.8,
"url": "https://blog.torproject.org/blog/tor-and-beast-ssl-attack"
},
{
"trust": 0.8,
"url": "http://src.chromium.org/viewvc/chrome?view=rev\u0026revision=97269"
},
{
"trust": 0.8,
"url": "http://www.ekoparty.org/2011/juliano-rizzo.php"
},
{
"trust": 0.8,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-14-098-03"
},
{
"trust": 0.8,
"url": "https://www.us-cert.gov/ics/advisories/icsma-18-058-02"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu381963/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu95174988/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu864643"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta12-010a/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu95868425/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu700214"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu692779"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3389"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3389"
},
{
"trust": 0.4,
"url": "http://xforce.iss.net/xforce/xfdb/70069"
},
{
"trust": 0.4,
"url": "http://www.ibm.com/support/docview.wss?uid=swg21568229"
},
{
"trust": 0.3,
"url": "http://www.collax.com/download/file/target/frame/file/2926"
},
{
"trust": 0.3,
"url": "http://www.collax.com/produkte/allinone-server-for-small-businesses"
},
{
"trust": 0.3,
"url": "http://www.collax.com/download/file/target/frame/file/2930"
},
{
"trust": 0.3,
"url": "http://www.collax.com/produkte/email-calendar-contacts-in-a-safe-business-server"
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21578730"
},
{
"trust": 0.3,
"url": "http://blogs.oracle.com/sunsecurity/entry/cve_2011_3389_chosen_plaintext2"
},
{
"trust": 0.3,
"url": "seclists.org/bugtraq/2014/apr/att-70/esa-2012-032.txt"
},
{
"trust": 0.3,
"url": "http://seclists.org/bugtraq/2012/sep/att-39/esa-2012-032.txt"
},
{
"trust": 0.3,
"url": "http://seclists.org/bugtraq/2014/mar/att-156/esa-2014-016.txt"
},
{
"trust": 0.3,
"url": "http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/"
},
{
"trust": 0.3,
"url": "http://www.kerio.com/connect/history"
},
{
"trust": 0.3,
"url": "http://www.matrixssl.org/"
},
{
"trust": 0.3,
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_python"
},
{
"trust": 0.3,
"url": "http://www.novell.com/support/viewcontent.do?externalid=7009901\u0026sliceid=1"
},
{
"trust": 0.3,
"url": "http://www.opera.com/support/kb/view/1000/"
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1pm60958"
},
{
"trust": 0.3,
"url": "https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_ibm_system_x_and_flex_systems_browser_exploit_against_ssl_tls_beast_mitigations_cve_2011_33891?lang=en_us"
},
{
"trust": 0.3,
"url": "http://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00"
},
{
"trust": 0.3,
"url": "http://www.ietf.org/rfc/rfc2246.txt"
},
{
"trust": 0.3,
"url": "http://www.ibm.com/support/docview.wss?uid=swg21571596"
},
{
"trust": 0.3,
"url": "/archive/1/524142"
},
{
"trust": 0.3,
"url": "http://support.apple.com/kb/ht5416"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/css/p8/documents/100151219"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/css/p8/documents/100150852"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/css/p8/documents/100154049"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/css/p8/documents/100154899"
},
{
"trust": 0.3,
"url": "http://seclists.org/bugtraq/2013/jun/att-65/esa-2013-039.txt"
},
{
"trust": 0.3,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03358587"
},
{
"trust": 0.3,
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?docid=emr_na-c03909126-1\u0026ac.admitted=1378134276525.876444892.492883150"
},
{
"trust": 0.3,
"url": "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03266681\u0026ac.admitted=1333452464452.876444892.492883150"
},
{
"trust": 0.3,
"url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs11-024/index.html"
},
{
"trust": 0.3,
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5093636"
},
{
"trust": 0.3,
"url": "http://technet.microsoft.com/en-us/security/advisory/2588513"
},
{
"trust": 0.3,
"url": "http://technet.microsoft.com/en-us/security/bulletin/ms12-006"
},
{
"trust": 0.3,
"url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs13-018/index.html"
},
{
"trust": 0.3,
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643845"
},
{
"trust": 0.3,
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5093630"
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21641966"
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022152"
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21609004"
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21609022"
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1019998"
},
{
"trust": 0.3,
"url": "http://lists.vmware.com/pipermail/security-announce/2012/000162.html"
},
{
"trust": 0.3,
"url": "http://www.vmware.com/security/advisories/vmsa-2012-0005.html"
},
{
"trust": 0.3,
"url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-011/index.html"
},
{
"trust": 0.3,
"url": "http://www.xerox.com/download/security/security-bulletin/12047-4e4eed8d42ca6/cert_xrx13-007_v1.0.pdf"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3560"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3552"
},
{
"trust": 0.3,
"url": "http://www.mandriva.com/security/"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3556"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3557"
},
{
"trust": 0.3,
"url": "http://www.mandriva.com/security/advisories"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3548"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3547"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3521"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3553"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3558"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3554"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3544"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3551"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3560.html"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3547.html"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3548.html"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3557.html"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/kb/docs/doc-11259"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3556.html"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3389.html"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3552.html"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/team/key/#package"
},
{
"trust": 0.2,
"url": "http://bugzilla.redhat.com/):"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/46791/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_intelligence/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/46791/"
},
{
"trust": 0.1,
"url": "http://secunia.com/resources/events/sc_2011/"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46791"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3377"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3556"
},
{
"trust": 0.1,
"url": "http://secunia.com/"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3552"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3558"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3560"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3553"
},
{
"trust": 0.1,
"url": "https://www.ample.com"
},
{
"trust": 0.1,
"url": "https://www.example.com,"
},
{
"trust": 0.1,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3557"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3554"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3551"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3377"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3544"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3521"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3548"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3547"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2110"
},
{
"trust": 0.1,
"url": "https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604."
},
{
"trust": 0.1,
"url": "http://www.emc.com/contact-us/contact/product-security-response-center.html"
},
{
"trust": 0.1,
"url": "https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3."
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2131"
},
{
"trust": 0.1,
"url": "https://knowledge.rsasecurity.com"
},
{
"trust": 0.1,
"url": "http://www.rsa.com/node.aspx?id=1204."
},
{
"trust": 0.1,
"url": "http://www.rsa.com/node.aspx?id=1264"
},
{
"trust": 0.1,
"url": "http://www.rsa.com/node.aspx?id=2575"
},
{
"trust": 0.1,
"url": "https://knowledge.rsasecurity.com,"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3549"
},
{
"trust": 0.1,
"url": "https://rhn.redhat.com/errata/rhsa-2012-0006.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3549.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3545"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3545.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1796"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-6549"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0064"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1774"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1899"
},
{
"trust": 0.1,
"url": "http://web.nvd.nist.gov/view/vuln/search"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1798"
},
{
"trust": 0.1,
"url": "https://support.emc.com/products/28224_unisphere-central"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0160"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2137"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0311"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1792"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0914"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0349"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0020"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1848"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-5298"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0268"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov)"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0216"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1767"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1860"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-6085"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0231"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-5885"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0913"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1797"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-5107"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/home.cfm."
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-6548"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1772"
},
{
"trust": 0.1,
"url": "http://curl.haxx.se/libcurl/c/curl_easy_setopt.html#curloptssloptions"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0036"
},
{
"trust": 0.1,
"url": "http://thread.gmane.org/gmane.comp.web.curl.library/34659"
},
{
"trust": 0.1,
"url": "http://curl.haxx.se/docs/adv_20120124.html"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0036"
},
{
"trust": 0.1,
"url": "http://curl.haxx.se/docs/manpage.html#--ssl-allow-beast"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4944"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0845"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4944"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0876"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-1150"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0845"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0876"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1150"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3554.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3553.html"
},
{
"trust": 0.1,
"url": "http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/news"
},
{
"trust": 0.1,
"url": "https://rhn.redhat.com/errata/rhsa-2011-1380.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3551.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3544.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3521.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3558.html"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#864643"
},
{
"db": "BID",
"id": "49778"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002305"
},
{
"db": "PACKETSTORM",
"id": "106901"
},
{
"db": "PACKETSTORM",
"id": "106868"
},
{
"db": "PACKETSTORM",
"id": "116431"
},
{
"db": "PACKETSTORM",
"id": "108498"
},
{
"db": "PACKETSTORM",
"id": "130188"
},
{
"db": "PACKETSTORM",
"id": "111851"
},
{
"db": "PACKETSTORM",
"id": "114007"
},
{
"db": "PACKETSTORM",
"id": "105967"
},
{
"db": "NVD",
"id": "CVE-2011-3389"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#864643"
},
{
"db": "VULMON",
"id": "CVE-2011-3389"
},
{
"db": "BID",
"id": "49778"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002305"
},
{
"db": "PACKETSTORM",
"id": "106901"
},
{
"db": "PACKETSTORM",
"id": "106868"
},
{
"db": "PACKETSTORM",
"id": "116431"
},
{
"db": "PACKETSTORM",
"id": "108498"
},
{
"db": "PACKETSTORM",
"id": "130188"
},
{
"db": "PACKETSTORM",
"id": "111851"
},
{
"db": "PACKETSTORM",
"id": "114007"
},
{
"db": "PACKETSTORM",
"id": "105967"
},
{
"db": "NVD",
"id": "CVE-2011-3389"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-09-27T00:00:00",
"db": "CERT/CC",
"id": "VU#864643"
},
{
"date": "2011-09-06T00:00:00",
"db": "VULMON",
"id": "CVE-2011-3389"
},
{
"date": "2011-09-19T00:00:00",
"db": "BID",
"id": "49778"
},
{
"date": "2011-10-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-002305"
},
{
"date": "2011-11-12T02:51:49",
"db": "PACKETSTORM",
"id": "106901"
},
{
"date": "2011-11-12T00:06:50",
"db": "PACKETSTORM",
"id": "106868"
},
{
"date": "2012-09-11T20:10:56",
"db": "PACKETSTORM",
"id": "116431"
},
{
"date": "2012-01-09T22:38:38",
"db": "PACKETSTORM",
"id": "108498"
},
{
"date": "2015-01-30T22:43:20",
"db": "PACKETSTORM",
"id": "130188"
},
{
"date": "2012-04-13T22:09:17",
"db": "PACKETSTORM",
"id": "111851"
},
{
"date": "2012-06-21T05:33:44",
"db": "PACKETSTORM",
"id": "114007"
},
{
"date": "2011-10-19T00:58:21",
"db": "PACKETSTORM",
"id": "105967"
},
{
"date": "2011-09-06T19:55:03.197000",
"db": "NVD",
"id": "CVE-2011-3389"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-12-08T00:00:00",
"db": "CERT/CC",
"id": "VU#864643"
},
{
"date": "2022-11-29T00:00:00",
"db": "VULMON",
"id": "CVE-2011-3389"
},
{
"date": "2019-07-16T13:00:00",
"db": "BID",
"id": "49778"
},
{
"date": "2019-07-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-002305"
},
{
"date": "2024-11-21T01:30:25.357000",
"db": "NVD",
"id": "CVE-2011-3389"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "49778"
}
],
"trust": 0.3
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SSL 3.0 and TLS 1.0 allow chosen plaintext attack in CBC modes",
"sources": [
{
"db": "CERT/CC",
"id": "VU#864643"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "49778"
}
],
"trust": 0.3
}
}
ghsa-rhch-pcq2-7gp3
Vulnerability from github
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
{
"affected": [],
"aliases": [
"CVE-2011-3389"
],
"database_specific": {
"cwe_ids": [
"CWE-20",
"CWE-326"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-09-06T19:55:00Z",
"severity": "MODERATE"
},
"details": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"id": "GHSA-rhch-pcq2-7gp3",
"modified": "2025-04-11T03:50:17Z",
"published": "2022-05-13T01:07:48Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389"
},
{
"type": "WEB",
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"type": "WEB",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=719047"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
},
{
"type": "WEB",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006"
},
{
"type": "WEB",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"type": "WEB",
"url": "https://hermes.opensuse.org/messages/13154861"
},
{
"type": "WEB",
"url": "https://hermes.opensuse.org/messages/13155432"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752"
},
{
"type": "WEB",
"url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications"
},
{
"type": "WEB",
"url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx"
},
{
"type": "WEB",
"url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx"
},
{
"type": "WEB",
"url": "http://curl.haxx.se/docs/adv_20120124B.html"
},
{
"type": "WEB",
"url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html"
},
{
"type": "WEB",
"url": "http://ekoparty.org/2011/juliano-rizzo.php"
},
{
"type": "WEB",
"url": "http://eprint.iacr.org/2004/111"
},
{
"type": "WEB",
"url": "http://eprint.iacr.org/2006/136"
},
{
"type": "WEB",
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"type": "WEB",
"url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"type": "WEB",
"url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue"
},
{
"type": "WEB",
"url": "http://osvdb.org/74829"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/45791"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/47998"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48256"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48692"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48915"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48948"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/49198"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/55322"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/55350"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/55351"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4999"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5001"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5130"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5281"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5501"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT6150"
},
{
"type": "WEB",
"url": "http://technet.microsoft.com/security/advisory/2588513"
},
{
"type": "WEB",
"url": "http://vnhacker.blogspot.com/2011/09/beast.html"
},
{
"type": "WEB",
"url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2012/dsa-2398"
},
{
"type": "WEB",
"url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html"
},
{
"type": "WEB",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts"
},
{
"type": "WEB",
"url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html"
},
{
"type": "WEB",
"url": "http://www.insecure.cl/Beast-SSL.rar"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/864643"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058"
},
{
"type": "WEB",
"url": "http://www.opera.com/docs/changelogs/mac/1151"
},
{
"type": "WEB",
"url": "http://www.opera.com/docs/changelogs/mac/1160"
},
{
"type": "WEB",
"url": "http://www.opera.com/docs/changelogs/unix/1151"
},
{
"type": "WEB",
"url": "http://www.opera.com/docs/changelogs/unix/1160"
},
{
"type": "WEB",
"url": "http://www.opera.com/docs/changelogs/windows/1151"
},
{
"type": "WEB",
"url": "http://www.opera.com/docs/changelogs/windows/1160"
},
{
"type": "WEB",
"url": "http://www.opera.com/support/kb/view/1004"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/49388"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/49778"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1029190"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1025997"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1026103"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1026704"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1263-1"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
suse-su-2020:0234-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python fixes the following issues:\n\nUpdated to version 2.7.17 to unify packages among openSUSE:Factory and SLE versions (bsc#1159035).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-234,SUSE-SLE-Module-Basesystem-15-2020-234,SUSE-SLE-Module-Basesystem-15-SP1-2020-234,SUSE-SLE-Module-Desktop-Applications-15-2020-234,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-234,SUSE-SLE-Module-Development-Tools-OBS-15-2020-234,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-234,SUSE-SLE-Module-Python2-15-SP1-2020-234",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0234-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:0234-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200234-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:0234-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027282",
"url": "https://bugzilla.suse.com/1027282"
},
{
"category": "self",
"summary": "SUSE Bug 1041090",
"url": "https://bugzilla.suse.com/1041090"
},
{
"category": "self",
"summary": "SUSE Bug 1042670",
"url": "https://bugzilla.suse.com/1042670"
},
{
"category": "self",
"summary": "SUSE Bug 1068664",
"url": "https://bugzilla.suse.com/1068664"
},
{
"category": "self",
"summary": "SUSE Bug 1073269",
"url": "https://bugzilla.suse.com/1073269"
},
{
"category": "self",
"summary": "SUSE Bug 1073748",
"url": "https://bugzilla.suse.com/1073748"
},
{
"category": "self",
"summary": "SUSE Bug 1078326",
"url": "https://bugzilla.suse.com/1078326"
},
{
"category": "self",
"summary": "SUSE Bug 1078485",
"url": "https://bugzilla.suse.com/1078485"
},
{
"category": "self",
"summary": "SUSE Bug 1079300",
"url": "https://bugzilla.suse.com/1079300"
},
{
"category": "self",
"summary": "SUSE Bug 1081750",
"url": "https://bugzilla.suse.com/1081750"
},
{
"category": "self",
"summary": "SUSE Bug 1083507",
"url": "https://bugzilla.suse.com/1083507"
},
{
"category": "self",
"summary": "SUSE Bug 1084650",
"url": "https://bugzilla.suse.com/1084650"
},
{
"category": "self",
"summary": "SUSE Bug 1086001",
"url": "https://bugzilla.suse.com/1086001"
},
{
"category": "self",
"summary": "SUSE Bug 1088004",
"url": "https://bugzilla.suse.com/1088004"
},
{
"category": "self",
"summary": "SUSE Bug 1088009",
"url": "https://bugzilla.suse.com/1088009"
},
{
"category": "self",
"summary": "SUSE Bug 1109847",
"url": "https://bugzilla.suse.com/1109847"
},
{
"category": "self",
"summary": "SUSE Bug 1111793",
"url": "https://bugzilla.suse.com/1111793"
},
{
"category": "self",
"summary": "SUSE Bug 1113755",
"url": "https://bugzilla.suse.com/1113755"
},
{
"category": "self",
"summary": "SUSE Bug 1122191",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "self",
"summary": "SUSE Bug 1129346",
"url": "https://bugzilla.suse.com/1129346"
},
{
"category": "self",
"summary": "SUSE Bug 1130840",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "self",
"summary": "SUSE Bug 1130847",
"url": "https://bugzilla.suse.com/1130847"
},
{
"category": "self",
"summary": "SUSE Bug 1138459",
"url": "https://bugzilla.suse.com/1138459"
},
{
"category": "self",
"summary": "SUSE Bug 1141853",
"url": "https://bugzilla.suse.com/1141853"
},
{
"category": "self",
"summary": "SUSE Bug 1149792",
"url": "https://bugzilla.suse.com/1149792"
},
{
"category": "self",
"summary": "SUSE Bug 1149955",
"url": "https://bugzilla.suse.com/1149955"
},
{
"category": "self",
"summary": "SUSE Bug 1153238",
"url": "https://bugzilla.suse.com/1153238"
},
{
"category": "self",
"summary": "SUSE Bug 1153830",
"url": "https://bugzilla.suse.com/1153830"
},
{
"category": "self",
"summary": "SUSE Bug 1159035",
"url": "https://bugzilla.suse.com/1159035"
},
{
"category": "self",
"summary": "SUSE Bug 214983",
"url": "https://bugzilla.suse.com/214983"
},
{
"category": "self",
"summary": "SUSE Bug 298378",
"url": "https://bugzilla.suse.com/298378"
},
{
"category": "self",
"summary": "SUSE Bug 346490",
"url": "https://bugzilla.suse.com/346490"
},
{
"category": "self",
"summary": "SUSE Bug 367853",
"url": "https://bugzilla.suse.com/367853"
},
{
"category": "self",
"summary": "SUSE Bug 379534",
"url": "https://bugzilla.suse.com/379534"
},
{
"category": "self",
"summary": "SUSE Bug 380942",
"url": "https://bugzilla.suse.com/380942"
},
{
"category": "self",
"summary": "SUSE Bug 399190",
"url": "https://bugzilla.suse.com/399190"
},
{
"category": "self",
"summary": "SUSE Bug 406051",
"url": "https://bugzilla.suse.com/406051"
},
{
"category": "self",
"summary": "SUSE Bug 425138",
"url": "https://bugzilla.suse.com/425138"
},
{
"category": "self",
"summary": "SUSE Bug 426563",
"url": "https://bugzilla.suse.com/426563"
},
{
"category": "self",
"summary": "SUSE Bug 430761",
"url": "https://bugzilla.suse.com/430761"
},
{
"category": "self",
"summary": "SUSE Bug 432677",
"url": "https://bugzilla.suse.com/432677"
},
{
"category": "self",
"summary": "SUSE Bug 436966",
"url": "https://bugzilla.suse.com/436966"
},
{
"category": "self",
"summary": "SUSE Bug 437293",
"url": "https://bugzilla.suse.com/437293"
},
{
"category": "self",
"summary": "SUSE Bug 441088",
"url": "https://bugzilla.suse.com/441088"
},
{
"category": "self",
"summary": "SUSE Bug 462375",
"url": "https://bugzilla.suse.com/462375"
},
{
"category": "self",
"summary": "SUSE Bug 525295",
"url": "https://bugzilla.suse.com/525295"
},
{
"category": "self",
"summary": "SUSE Bug 534721",
"url": "https://bugzilla.suse.com/534721"
},
{
"category": "self",
"summary": "SUSE Bug 551715",
"url": "https://bugzilla.suse.com/551715"
},
{
"category": "self",
"summary": "SUSE Bug 572673",
"url": "https://bugzilla.suse.com/572673"
},
{
"category": "self",
"summary": "SUSE Bug 577032",
"url": "https://bugzilla.suse.com/577032"
},
{
"category": "self",
"summary": "SUSE Bug 581765",
"url": "https://bugzilla.suse.com/581765"
},
{
"category": "self",
"summary": "SUSE Bug 603255",
"url": "https://bugzilla.suse.com/603255"
},
{
"category": "self",
"summary": "SUSE Bug 617751",
"url": "https://bugzilla.suse.com/617751"
},
{
"category": "self",
"summary": "SUSE Bug 637176",
"url": "https://bugzilla.suse.com/637176"
},
{
"category": "self",
"summary": "SUSE Bug 638233",
"url": "https://bugzilla.suse.com/638233"
},
{
"category": "self",
"summary": "SUSE Bug 658604",
"url": "https://bugzilla.suse.com/658604"
},
{
"category": "self",
"summary": "SUSE Bug 673071",
"url": "https://bugzilla.suse.com/673071"
},
{
"category": "self",
"summary": "SUSE Bug 682554",
"url": "https://bugzilla.suse.com/682554"
},
{
"category": "self",
"summary": "SUSE Bug 697251",
"url": "https://bugzilla.suse.com/697251"
},
{
"category": "self",
"summary": "SUSE Bug 707667",
"url": "https://bugzilla.suse.com/707667"
},
{
"category": "self",
"summary": "SUSE Bug 718009",
"url": "https://bugzilla.suse.com/718009"
},
{
"category": "self",
"summary": "SUSE Bug 747125",
"url": "https://bugzilla.suse.com/747125"
},
{
"category": "self",
"summary": "SUSE Bug 747794",
"url": "https://bugzilla.suse.com/747794"
},
{
"category": "self",
"summary": "SUSE Bug 751718",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "self",
"summary": "SUSE Bug 754447",
"url": "https://bugzilla.suse.com/754447"
},
{
"category": "self",
"summary": "SUSE Bug 766778",
"url": "https://bugzilla.suse.com/766778"
},
{
"category": "self",
"summary": "SUSE Bug 794139",
"url": "https://bugzilla.suse.com/794139"
},
{
"category": "self",
"summary": "SUSE Bug 804978",
"url": "https://bugzilla.suse.com/804978"
},
{
"category": "self",
"summary": "SUSE Bug 827982",
"url": "https://bugzilla.suse.com/827982"
},
{
"category": "self",
"summary": "SUSE Bug 831442",
"url": "https://bugzilla.suse.com/831442"
},
{
"category": "self",
"summary": "SUSE Bug 834601",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "self",
"summary": "SUSE Bug 836739",
"url": "https://bugzilla.suse.com/836739"
},
{
"category": "self",
"summary": "SUSE Bug 856835",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "self",
"summary": "SUSE Bug 856836",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "self",
"summary": "SUSE Bug 857470",
"url": "https://bugzilla.suse.com/857470"
},
{
"category": "self",
"summary": "SUSE Bug 863741",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "self",
"summary": "SUSE Bug 885882",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "self",
"summary": "SUSE Bug 898572",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "self",
"summary": "SUSE Bug 901715",
"url": "https://bugzilla.suse.com/901715"
},
{
"category": "self",
"summary": "SUSE Bug 935856",
"url": "https://bugzilla.suse.com/935856"
},
{
"category": "self",
"summary": "SUSE Bug 945401",
"url": "https://bugzilla.suse.com/945401"
},
{
"category": "self",
"summary": "SUSE Bug 964182",
"url": "https://bugzilla.suse.com/964182"
},
{
"category": "self",
"summary": "SUSE Bug 984751",
"url": "https://bugzilla.suse.com/984751"
},
{
"category": "self",
"summary": "SUSE Bug 985177",
"url": "https://bugzilla.suse.com/985177"
},
{
"category": "self",
"summary": "SUSE Bug 985348",
"url": "https://bugzilla.suse.com/985348"
},
{
"category": "self",
"summary": "SUSE Bug 989523",
"url": "https://bugzilla.suse.com/989523"
},
{
"category": "self",
"summary": "SUSE Bug 997436",
"url": "https://bugzilla.suse.com/997436"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-2052 page",
"url": "https://www.suse.com/security/cve/CVE-2007-2052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-1721 page",
"url": "https://www.suse.com/security/cve/CVE-2008-1721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-2315 page",
"url": "https://www.suse.com/security/cve/CVE-2008-2315/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-2316 page",
"url": "https://www.suse.com/security/cve/CVE-2008-2316/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-3142 page",
"url": "https://www.suse.com/security/cve/CVE-2008-3142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-3143 page",
"url": "https://www.suse.com/security/cve/CVE-2008-3143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-3144 page",
"url": "https://www.suse.com/security/cve/CVE-2008-3144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-1521 page",
"url": "https://www.suse.com/security/cve/CVE-2011-1521/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1753 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-1912 page",
"url": "https://www.suse.com/security/cve/CVE-2014-1912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7185 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0772 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000110 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5636 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5699 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5699/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000158 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18207 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000030 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000802 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000802/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1060 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1061 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14647 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20852 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10160 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16935 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16935/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9636 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9948 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9948/"
}
],
"title": "Security update for python",
"tracking": {
"current_release_date": "2020-01-24T15:34:18Z",
"generator": {
"date": "2020-01-24T15:34:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:0234-1",
"initial_release_date": "2020-01-24T15:34:18Z",
"revision_history": [
{
"date": "2020-01-24T15:34:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"product": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"product_id": "libpython2_7-1_0-2.7.17-7.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "python-2.7.17-7.32.2.aarch64",
"product": {
"name": "python-2.7.17-7.32.2.aarch64",
"product_id": "python-2.7.17-7.32.2.aarch64"
}
},
{
"category": "product_version",
"name": "python-base-2.7.17-7.32.1.aarch64",
"product": {
"name": "python-base-2.7.17-7.32.1.aarch64",
"product_id": "python-base-2.7.17-7.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "python-curses-2.7.17-7.32.2.aarch64",
"product": {
"name": "python-curses-2.7.17-7.32.2.aarch64",
"product_id": "python-curses-2.7.17-7.32.2.aarch64"
}
},
{
"category": "product_version",
"name": "python-demo-2.7.17-7.32.2.aarch64",
"product": {
"name": "python-demo-2.7.17-7.32.2.aarch64",
"product_id": "python-demo-2.7.17-7.32.2.aarch64"
}
},
{
"category": "product_version",
"name": "python-devel-2.7.17-7.32.1.aarch64",
"product": {
"name": "python-devel-2.7.17-7.32.1.aarch64",
"product_id": "python-devel-2.7.17-7.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "python-gdbm-2.7.17-7.32.2.aarch64",
"product": {
"name": "python-gdbm-2.7.17-7.32.2.aarch64",
"product_id": "python-gdbm-2.7.17-7.32.2.aarch64"
}
},
{
"category": "product_version",
"name": "python-idle-2.7.17-7.32.2.aarch64",
"product": {
"name": "python-idle-2.7.17-7.32.2.aarch64",
"product_id": "python-idle-2.7.17-7.32.2.aarch64"
}
},
{
"category": "product_version",
"name": "python-tk-2.7.17-7.32.2.aarch64",
"product": {
"name": "python-tk-2.7.17-7.32.2.aarch64",
"product_id": "python-tk-2.7.17-7.32.2.aarch64"
}
},
{
"category": "product_version",
"name": "python-xml-2.7.17-7.32.1.aarch64",
"product": {
"name": "python-xml-2.7.17-7.32.1.aarch64",
"product_id": "python-xml-2.7.17-7.32.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython2_7-1_0-64bit-2.7.17-7.32.1.aarch64_ilp32",
"product": {
"name": "libpython2_7-1_0-64bit-2.7.17-7.32.1.aarch64_ilp32",
"product_id": "libpython2_7-1_0-64bit-2.7.17-7.32.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python-64bit-2.7.17-7.32.2.aarch64_ilp32",
"product": {
"name": "python-64bit-2.7.17-7.32.2.aarch64_ilp32",
"product_id": "python-64bit-2.7.17-7.32.2.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python-base-64bit-2.7.17-7.32.1.aarch64_ilp32",
"product": {
"name": "python-base-64bit-2.7.17-7.32.1.aarch64_ilp32",
"product_id": "python-base-64bit-2.7.17-7.32.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython2_7-1_0-2.7.17-7.32.1.i586",
"product": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.i586",
"product_id": "libpython2_7-1_0-2.7.17-7.32.1.i586"
}
},
{
"category": "product_version",
"name": "python-2.7.17-7.32.2.i586",
"product": {
"name": "python-2.7.17-7.32.2.i586",
"product_id": "python-2.7.17-7.32.2.i586"
}
},
{
"category": "product_version",
"name": "python-base-2.7.17-7.32.1.i586",
"product": {
"name": "python-base-2.7.17-7.32.1.i586",
"product_id": "python-base-2.7.17-7.32.1.i586"
}
},
{
"category": "product_version",
"name": "python-curses-2.7.17-7.32.2.i586",
"product": {
"name": "python-curses-2.7.17-7.32.2.i586",
"product_id": "python-curses-2.7.17-7.32.2.i586"
}
},
{
"category": "product_version",
"name": "python-demo-2.7.17-7.32.2.i586",
"product": {
"name": "python-demo-2.7.17-7.32.2.i586",
"product_id": "python-demo-2.7.17-7.32.2.i586"
}
},
{
"category": "product_version",
"name": "python-devel-2.7.17-7.32.1.i586",
"product": {
"name": "python-devel-2.7.17-7.32.1.i586",
"product_id": "python-devel-2.7.17-7.32.1.i586"
}
},
{
"category": "product_version",
"name": "python-gdbm-2.7.17-7.32.2.i586",
"product": {
"name": "python-gdbm-2.7.17-7.32.2.i586",
"product_id": "python-gdbm-2.7.17-7.32.2.i586"
}
},
{
"category": "product_version",
"name": "python-idle-2.7.17-7.32.2.i586",
"product": {
"name": "python-idle-2.7.17-7.32.2.i586",
"product_id": "python-idle-2.7.17-7.32.2.i586"
}
},
{
"category": "product_version",
"name": "python-tk-2.7.17-7.32.2.i586",
"product": {
"name": "python-tk-2.7.17-7.32.2.i586",
"product_id": "python-tk-2.7.17-7.32.2.i586"
}
},
{
"category": "product_version",
"name": "python-xml-2.7.17-7.32.1.i586",
"product": {
"name": "python-xml-2.7.17-7.32.1.i586",
"product_id": "python-xml-2.7.17-7.32.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "python-doc-2.7.17-7.32.2.noarch",
"product": {
"name": "python-doc-2.7.17-7.32.2.noarch",
"product_id": "python-doc-2.7.17-7.32.2.noarch"
}
},
{
"category": "product_version",
"name": "python-doc-pdf-2.7.17-7.32.2.noarch",
"product": {
"name": "python-doc-pdf-2.7.17-7.32.2.noarch",
"product_id": "python-doc-pdf-2.7.17-7.32.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"product": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"product_id": "libpython2_7-1_0-2.7.17-7.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python-2.7.17-7.32.2.ppc64le",
"product": {
"name": "python-2.7.17-7.32.2.ppc64le",
"product_id": "python-2.7.17-7.32.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python-base-2.7.17-7.32.1.ppc64le",
"product": {
"name": "python-base-2.7.17-7.32.1.ppc64le",
"product_id": "python-base-2.7.17-7.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python-curses-2.7.17-7.32.2.ppc64le",
"product": {
"name": "python-curses-2.7.17-7.32.2.ppc64le",
"product_id": "python-curses-2.7.17-7.32.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python-demo-2.7.17-7.32.2.ppc64le",
"product": {
"name": "python-demo-2.7.17-7.32.2.ppc64le",
"product_id": "python-demo-2.7.17-7.32.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python-devel-2.7.17-7.32.1.ppc64le",
"product": {
"name": "python-devel-2.7.17-7.32.1.ppc64le",
"product_id": "python-devel-2.7.17-7.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python-gdbm-2.7.17-7.32.2.ppc64le",
"product": {
"name": "python-gdbm-2.7.17-7.32.2.ppc64le",
"product_id": "python-gdbm-2.7.17-7.32.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python-idle-2.7.17-7.32.2.ppc64le",
"product": {
"name": "python-idle-2.7.17-7.32.2.ppc64le",
"product_id": "python-idle-2.7.17-7.32.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python-tk-2.7.17-7.32.2.ppc64le",
"product": {
"name": "python-tk-2.7.17-7.32.2.ppc64le",
"product_id": "python-tk-2.7.17-7.32.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python-xml-2.7.17-7.32.1.ppc64le",
"product": {
"name": "python-xml-2.7.17-7.32.1.ppc64le",
"product_id": "python-xml-2.7.17-7.32.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython2_7-1_0-2.7.17-7.32.1.s390x",
"product": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.s390x",
"product_id": "libpython2_7-1_0-2.7.17-7.32.1.s390x"
}
},
{
"category": "product_version",
"name": "python-2.7.17-7.32.2.s390x",
"product": {
"name": "python-2.7.17-7.32.2.s390x",
"product_id": "python-2.7.17-7.32.2.s390x"
}
},
{
"category": "product_version",
"name": "python-base-2.7.17-7.32.1.s390x",
"product": {
"name": "python-base-2.7.17-7.32.1.s390x",
"product_id": "python-base-2.7.17-7.32.1.s390x"
}
},
{
"category": "product_version",
"name": "python-curses-2.7.17-7.32.2.s390x",
"product": {
"name": "python-curses-2.7.17-7.32.2.s390x",
"product_id": "python-curses-2.7.17-7.32.2.s390x"
}
},
{
"category": "product_version",
"name": "python-demo-2.7.17-7.32.2.s390x",
"product": {
"name": "python-demo-2.7.17-7.32.2.s390x",
"product_id": "python-demo-2.7.17-7.32.2.s390x"
}
},
{
"category": "product_version",
"name": "python-devel-2.7.17-7.32.1.s390x",
"product": {
"name": "python-devel-2.7.17-7.32.1.s390x",
"product_id": "python-devel-2.7.17-7.32.1.s390x"
}
},
{
"category": "product_version",
"name": "python-gdbm-2.7.17-7.32.2.s390x",
"product": {
"name": "python-gdbm-2.7.17-7.32.2.s390x",
"product_id": "python-gdbm-2.7.17-7.32.2.s390x"
}
},
{
"category": "product_version",
"name": "python-idle-2.7.17-7.32.2.s390x",
"product": {
"name": "python-idle-2.7.17-7.32.2.s390x",
"product_id": "python-idle-2.7.17-7.32.2.s390x"
}
},
{
"category": "product_version",
"name": "python-tk-2.7.17-7.32.2.s390x",
"product": {
"name": "python-tk-2.7.17-7.32.2.s390x",
"product_id": "python-tk-2.7.17-7.32.2.s390x"
}
},
{
"category": "product_version",
"name": "python-xml-2.7.17-7.32.1.s390x",
"product": {
"name": "python-xml-2.7.17-7.32.1.s390x",
"product_id": "python-xml-2.7.17-7.32.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"product": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"product_id": "libpython2_7-1_0-2.7.17-7.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpython2_7-1_0-32bit-2.7.17-7.32.1.x86_64",
"product": {
"name": "libpython2_7-1_0-32bit-2.7.17-7.32.1.x86_64",
"product_id": "libpython2_7-1_0-32bit-2.7.17-7.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "python-2.7.17-7.32.2.x86_64",
"product": {
"name": "python-2.7.17-7.32.2.x86_64",
"product_id": "python-2.7.17-7.32.2.x86_64"
}
},
{
"category": "product_version",
"name": "python-32bit-2.7.17-7.32.2.x86_64",
"product": {
"name": "python-32bit-2.7.17-7.32.2.x86_64",
"product_id": "python-32bit-2.7.17-7.32.2.x86_64"
}
},
{
"category": "product_version",
"name": "python-base-2.7.17-7.32.1.x86_64",
"product": {
"name": "python-base-2.7.17-7.32.1.x86_64",
"product_id": "python-base-2.7.17-7.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "python-base-32bit-2.7.17-7.32.1.x86_64",
"product": {
"name": "python-base-32bit-2.7.17-7.32.1.x86_64",
"product_id": "python-base-32bit-2.7.17-7.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "python-curses-2.7.17-7.32.2.x86_64",
"product": {
"name": "python-curses-2.7.17-7.32.2.x86_64",
"product_id": "python-curses-2.7.17-7.32.2.x86_64"
}
},
{
"category": "product_version",
"name": "python-demo-2.7.17-7.32.2.x86_64",
"product": {
"name": "python-demo-2.7.17-7.32.2.x86_64",
"product_id": "python-demo-2.7.17-7.32.2.x86_64"
}
},
{
"category": "product_version",
"name": "python-devel-2.7.17-7.32.1.x86_64",
"product": {
"name": "python-devel-2.7.17-7.32.1.x86_64",
"product_id": "python-devel-2.7.17-7.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "python-gdbm-2.7.17-7.32.2.x86_64",
"product": {
"name": "python-gdbm-2.7.17-7.32.2.x86_64",
"product_id": "python-gdbm-2.7.17-7.32.2.x86_64"
}
},
{
"category": "product_version",
"name": "python-idle-2.7.17-7.32.2.x86_64",
"product": {
"name": "python-idle-2.7.17-7.32.2.x86_64",
"product_id": "python-idle-2.7.17-7.32.2.x86_64"
}
},
{
"category": "product_version",
"name": "python-tk-2.7.17-7.32.2.x86_64",
"product": {
"name": "python-tk-2.7.17-7.32.2.x86_64",
"product_id": "python-tk-2.7.17-7.32.2.x86_64"
}
},
{
"category": "product_version",
"name": "python-xml-2.7.17-7.32.1.x86_64",
"product": {
"name": "python-xml-2.7.17-7.32.1.x86_64",
"product_id": "python-xml-2.7.17-7.32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 2 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python2:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64"
},
"product_reference": "libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le"
},
"product_reference": "libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x"
},
"product_reference": "libpython2_7-1_0-2.7.17-7.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64"
},
"product_reference": "libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64"
},
"product_reference": "python-2.7.17-7.32.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le"
},
"product_reference": "python-2.7.17-7.32.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x"
},
"product_reference": "python-2.7.17-7.32.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64"
},
"product_reference": "python-2.7.17-7.32.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64"
},
"product_reference": "python-base-2.7.17-7.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le"
},
"product_reference": "python-base-2.7.17-7.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x"
},
"product_reference": "python-base-2.7.17-7.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64"
},
"product_reference": "python-base-2.7.17-7.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64"
},
"product_reference": "python-curses-2.7.17-7.32.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le"
},
"product_reference": "python-curses-2.7.17-7.32.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x"
},
"product_reference": "python-curses-2.7.17-7.32.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64"
},
"product_reference": "python-curses-2.7.17-7.32.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64"
},
"product_reference": "python-devel-2.7.17-7.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le"
},
"product_reference": "python-devel-2.7.17-7.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x"
},
"product_reference": "python-devel-2.7.17-7.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64"
},
"product_reference": "python-devel-2.7.17-7.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64"
},
"product_reference": "python-gdbm-2.7.17-7.32.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le"
},
"product_reference": "python-gdbm-2.7.17-7.32.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x"
},
"product_reference": "python-gdbm-2.7.17-7.32.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64"
},
"product_reference": "python-gdbm-2.7.17-7.32.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64"
},
"product_reference": "python-xml-2.7.17-7.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le"
},
"product_reference": "python-xml-2.7.17-7.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x"
},
"product_reference": "python-xml-2.7.17-7.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64"
},
"product_reference": "python-xml-2.7.17-7.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64"
},
"product_reference": "libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le"
},
"product_reference": "libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x"
},
"product_reference": "libpython2_7-1_0-2.7.17-7.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython2_7-1_0-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64"
},
"product_reference": "libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64"
},
"product_reference": "python-2.7.17-7.32.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le"
},
"product_reference": "python-2.7.17-7.32.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x"
},
"product_reference": "python-2.7.17-7.32.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64"
},
"product_reference": "python-2.7.17-7.32.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64"
},
"product_reference": "python-base-2.7.17-7.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le"
},
"product_reference": "python-base-2.7.17-7.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x"
},
"product_reference": "python-base-2.7.17-7.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-base-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64"
},
"product_reference": "python-base-2.7.17-7.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64"
},
"product_reference": "python-tk-2.7.17-7.32.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le"
},
"product_reference": "python-tk-2.7.17-7.32.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x"
},
"product_reference": "python-tk-2.7.17-7.32.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64"
},
"product_reference": "python-tk-2.7.17-7.32.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64"
},
"product_reference": "python-tk-2.7.17-7.32.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le"
},
"product_reference": "python-tk-2.7.17-7.32.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x"
},
"product_reference": "python-tk-2.7.17-7.32.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-tk-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64"
},
"product_reference": "python-tk-2.7.17-7.32.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64"
},
"product_reference": "python-curses-2.7.17-7.32.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le"
},
"product_reference": "python-curses-2.7.17-7.32.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x"
},
"product_reference": "python-curses-2.7.17-7.32.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-curses-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64"
},
"product_reference": "python-curses-2.7.17-7.32.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64"
},
"product_reference": "python-devel-2.7.17-7.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le"
},
"product_reference": "python-devel-2.7.17-7.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x"
},
"product_reference": "python-devel-2.7.17-7.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-devel-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64"
},
"product_reference": "python-devel-2.7.17-7.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64"
},
"product_reference": "python-gdbm-2.7.17-7.32.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le"
},
"product_reference": "python-gdbm-2.7.17-7.32.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x"
},
"product_reference": "python-gdbm-2.7.17-7.32.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gdbm-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64"
},
"product_reference": "python-gdbm-2.7.17-7.32.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64"
},
"product_reference": "python-xml-2.7.17-7.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le"
},
"product_reference": "python-xml-2.7.17-7.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x"
},
"product_reference": "python-xml-2.7.17-7.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-xml-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
},
"product_reference": "python-xml-2.7.17-7.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-2052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-2052"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-2052",
"url": "https://www.suse.com/security/cve/CVE-2007-2052"
},
{
"category": "external",
"summary": "SUSE Bug 276889 for CVE-2007-2052",
"url": "https://bugzilla.suse.com/276889"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2007-2052"
},
{
"cve": "CVE-2008-1721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-1721"
}
],
"notes": [
{
"category": "general",
"text": "Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-1721",
"url": "https://www.suse.com/security/cve/CVE-2008-1721"
},
{
"category": "external",
"summary": "SUSE Bug 379044 for CVE-2008-1721",
"url": "https://bugzilla.suse.com/379044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "important"
}
],
"title": "CVE-2008-1721"
},
{
"cve": "CVE-2008-2315",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-2315"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-2315",
"url": "https://www.suse.com/security/cve/CVE-2008-2315"
},
{
"category": "external",
"summary": "SUSE Bug 406051 for CVE-2008-2315",
"url": "https://bugzilla.suse.com/406051"
},
{
"category": "external",
"summary": "SUSE Bug 443653 for CVE-2008-2315",
"url": "https://bugzilla.suse.com/443653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "important"
}
],
"title": "CVE-2008-2315"
},
{
"cve": "CVE-2008-2316",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-2316"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to \"partial hashlib hashing of data exceeding 4GB.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-2316",
"url": "https://www.suse.com/security/cve/CVE-2008-2316"
},
{
"category": "external",
"summary": "SUSE Bug 406051 for CVE-2008-2316",
"url": "https://bugzilla.suse.com/406051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "important"
}
],
"title": "CVE-2008-2316"
},
{
"cve": "CVE-2008-3142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-3142"
}
],
"notes": [
{
"category": "general",
"text": "Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-3142",
"url": "https://www.suse.com/security/cve/CVE-2008-3142"
},
{
"category": "external",
"summary": "SUSE Bug 406051 for CVE-2008-3142",
"url": "https://bugzilla.suse.com/406051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "important"
}
],
"title": "CVE-2008-3142"
},
{
"cve": "CVE-2008-3143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-3143"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by \"checks for integer overflows, contributed by Google.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-3143",
"url": "https://www.suse.com/security/cve/CVE-2008-3143"
},
{
"category": "external",
"summary": "SUSE Bug 406051 for CVE-2008-3143",
"url": "https://bugzilla.suse.com/406051"
},
{
"category": "external",
"summary": "SUSE Bug 444989 for CVE-2008-3143",
"url": "https://bugzilla.suse.com/444989"
},
{
"category": "external",
"summary": "SUSE Bug 609759 for CVE-2008-3143",
"url": "https://bugzilla.suse.com/609759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "important"
}
],
"title": "CVE-2008-3143"
},
{
"cve": "CVE-2008-3144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-3144"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-3144",
"url": "https://www.suse.com/security/cve/CVE-2008-3144"
},
{
"category": "external",
"summary": "SUSE Bug 406051 for CVE-2008-3144",
"url": "https://bugzilla.suse.com/406051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2008-3144"
},
{
"cve": "CVE-2011-1521",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-1521"
}
],
"notes": [
{
"category": "general",
"text": "The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-1521",
"url": "https://www.suse.com/security/cve/CVE-2011-1521"
},
{
"category": "external",
"summary": "SUSE Bug 682554 for CVE-2011-1521",
"url": "https://bugzilla.suse.com/682554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2011-1521"
},
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-1753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1753"
}
],
"notes": [
{
"category": "general",
"text": "The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1753",
"url": "https://www.suse.com/security/cve/CVE-2013-1753"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1753",
"url": "https://bugzilla.suse.com/856835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2013-1753"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-1912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-1912"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-1912",
"url": "https://www.suse.com/security/cve/CVE-2014-1912"
},
{
"category": "external",
"summary": "SUSE Bug 1049392 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/1049392"
},
{
"category": "external",
"summary": "SUSE Bug 1049422 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/1049422"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-1912",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "important"
}
],
"title": "CVE-2014-1912"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2014-7185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7185"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a \"buffer\" function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7185",
"url": "https://www.suse.com/security/cve/CVE-2014-7185"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/912739"
},
{
"category": "external",
"summary": "SUSE Bug 913479 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/913479"
},
{
"category": "external",
"summary": "SUSE Bug 955182 for CVE-2014-7185",
"url": "https://bugzilla.suse.com/955182"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2014-7185"
},
{
"cve": "CVE-2016-0772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0772"
}
],
"notes": [
{
"category": "general",
"text": "The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a \"StartTLS stripping attack.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0772",
"url": "https://www.suse.com/security/cve/CVE-2016-0772"
},
{
"category": "external",
"summary": "SUSE Bug 984751 for CVE-2016-0772",
"url": "https://bugzilla.suse.com/984751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2016-0772"
},
{
"cve": "CVE-2016-1000110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000110"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000110",
"url": "https://www.suse.com/security/cve/CVE-2016-1000110"
},
{
"category": "external",
"summary": "SUSE Bug 988484 for CVE-2016-1000110",
"url": "https://bugzilla.suse.com/988484"
},
{
"category": "external",
"summary": "SUSE Bug 989523 for CVE-2016-1000110",
"url": "https://bugzilla.suse.com/989523"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2016-1000110"
},
{
"cve": "CVE-2016-5636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5636"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5636",
"url": "https://www.suse.com/security/cve/CVE-2016-5636"
},
{
"category": "external",
"summary": "SUSE Bug 1065451 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/1065451"
},
{
"category": "external",
"summary": "SUSE Bug 1106262 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/1106262"
},
{
"category": "external",
"summary": "SUSE Bug 985177 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/985177"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "important"
}
],
"title": "CVE-2016-5636"
},
{
"cve": "CVE-2016-5699",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5699"
}
],
"notes": [
{
"category": "general",
"text": "CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5699",
"url": "https://www.suse.com/security/cve/CVE-2016-5699"
},
{
"category": "external",
"summary": "SUSE Bug 1122729 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/1122729"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 985348 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/985348"
},
{
"category": "external",
"summary": "SUSE Bug 985351 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/985351"
},
{
"category": "external",
"summary": "SUSE Bug 986630 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/986630"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2016-5699"
},
{
"cve": "CVE-2017-1000158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000158"
}
],
"notes": [
{
"category": "general",
"text": "CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000158",
"url": "https://www.suse.com/security/cve/CVE-2017-1000158"
},
{
"category": "external",
"summary": "SUSE Bug 1068664 for CVE-2017-1000158",
"url": "https://bugzilla.suse.com/1068664"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "important"
}
],
"title": "CVE-2017-1000158"
},
{
"cve": "CVE-2017-18207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18207"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18207",
"url": "https://www.suse.com/security/cve/CVE-2017-18207"
},
{
"category": "external",
"summary": "SUSE Bug 1083507 for CVE-2017-18207",
"url": "https://bugzilla.suse.com/1083507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2017-18207"
},
{
"cve": "CVE-2018-1000030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000030"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3-\u003eMalloc-\u003eThread1-\u003eFree\u0027s-\u003eThread2-Re-uses-Free\u0027d Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an attacker to violate a trust boundary, as such the DWF feels this issue deserves a CVE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000030",
"url": "https://www.suse.com/security/cve/CVE-2018-1000030"
},
{
"category": "external",
"summary": "SUSE Bug 1079300 for CVE-2018-1000030",
"url": "https://bugzilla.suse.com/1079300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "important"
}
],
"title": "CVE-2018-1000030"
},
{
"cve": "CVE-2018-1000802",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000802"
}
],
"notes": [
{
"category": "general",
"text": "Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000802",
"url": "https://www.suse.com/security/cve/CVE-2018-1000802"
},
{
"category": "external",
"summary": "SUSE Bug 1109663 for CVE-2018-1000802",
"url": "https://bugzilla.suse.com/1109663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000802"
},
{
"cve": "CVE-2018-1060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1060"
}
],
"notes": [
{
"category": "general",
"text": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib\u0027s apop() method. An attacker could use this flaw to cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1060",
"url": "https://www.suse.com/security/cve/CVE-2018-1060"
},
{
"category": "external",
"summary": "SUSE Bug 1088009 for CVE-2018-1060",
"url": "https://bugzilla.suse.com/1088009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "low"
}
],
"title": "CVE-2018-1060"
},
{
"cve": "CVE-2018-1061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1061"
}
],
"notes": [
{
"category": "general",
"text": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1061",
"url": "https://www.suse.com/security/cve/CVE-2018-1061"
},
{
"category": "external",
"summary": "SUSE Bug 1088004 for CVE-2018-1061",
"url": "https://bugzilla.suse.com/1088004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-1061"
},
{
"cve": "CVE-2018-14647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14647"
}
],
"notes": [
{
"category": "general",
"text": "Python\u0027s elementtree C accelerator failed to initialise Expat\u0027s hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat\u0027s internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14647",
"url": "https://www.suse.com/security/cve/CVE-2018-14647"
},
{
"category": "external",
"summary": "SUSE Bug 1109847 for CVE-2018-14647",
"url": "https://bugzilla.suse.com/1109847"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2018-14647",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-14647"
},
{
"cve": "CVE-2018-20852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20852"
}
],
"notes": [
{
"category": "general",
"text": "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20852",
"url": "https://www.suse.com/security/cve/CVE-2018-20852"
},
{
"category": "external",
"summary": "SUSE Bug 1141853 for CVE-2018-20852",
"url": "https://bugzilla.suse.com/1141853"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-20852"
},
{
"cve": "CVE-2019-10160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10160"
}
],
"notes": [
{
"category": "general",
"text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10160",
"url": "https://www.suse.com/security/cve/CVE-2019-10160"
},
{
"category": "external",
"summary": "SUSE Bug 1138459 for CVE-2019-10160",
"url": "https://bugzilla.suse.com/1138459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "critical"
}
],
"title": "CVE-2019-10160"
},
{
"cve": "CVE-2019-16056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16056"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16056",
"url": "https://www.suse.com/security/cve/CVE-2019-16056"
},
{
"category": "external",
"summary": "SUSE Bug 1149955 for CVE-2019-16056",
"url": "https://bugzilla.suse.com/1149955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2019-16056"
},
{
"cve": "CVE-2019-16935",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16935"
}
],
"notes": [
{
"category": "general",
"text": "The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16935",
"url": "https://www.suse.com/security/cve/CVE-2019-16935"
},
{
"category": "external",
"summary": "SUSE Bug 1153238 for CVE-2019-16935",
"url": "https://bugzilla.suse.com/1153238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2019-16935"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "important"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9636"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9636",
"url": "https://www.suse.com/security/cve/CVE-2019-9636"
},
{
"category": "external",
"summary": "SUSE Bug 1129346 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1129346"
},
{
"category": "external",
"summary": "SUSE Bug 1135433 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1135433"
},
{
"category": "external",
"summary": "SUSE Bug 1138459 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1138459"
},
{
"category": "external",
"summary": "SUSE Bug 1145004 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1145004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "important"
}
],
"title": "CVE-2019-9636"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2019-9948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9948"
}
],
"notes": [
{
"category": "general",
"text": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen(\u0027local_file:///etc/passwd\u0027) call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9948",
"url": "https://www.suse.com/security/cve/CVE-2019-9948"
},
{
"category": "external",
"summary": "SUSE Bug 1130847 for CVE-2019-9948",
"url": "https://bugzilla.suse.com/1130847"
},
{
"category": "external",
"summary": "SUSE Bug 1135433 for CVE-2019-9948",
"url": "https://bugzilla.suse.com/1135433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-24T15:34:18Z",
"details": "low"
}
],
"title": "CVE-2019-9948"
}
]
}
suse-su-2020:0114-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python3 to version 3.6.10 fixes the following issues:\n\n- CVE-2017-18207: Fixed a denial of service in Wave_read._read_fmt_chunk() (bsc#1083507).\n- CVE-2019-16056: Fixed an issue where email parsing could fail for multiple @ (bsc#1149955).\n- CVE-2019-15903: Fixed a heap-based buffer over-read in libexpat (bsc#1149429).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-114,SUSE-SLE-Module-Basesystem-15-2020-114,SUSE-SLE-Module-Basesystem-15-SP1-2020-114,SUSE-SLE-Module-Development-Tools-15-2020-114,SUSE-SLE-Module-Development-Tools-15-SP1-2020-114,SUSE-SLE-Module-Development-Tools-OBS-15-2020-114,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-114",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0114-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:0114-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200114-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:0114-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027282",
"url": "https://bugzilla.suse.com/1027282"
},
{
"category": "self",
"summary": "SUSE Bug 1029377",
"url": "https://bugzilla.suse.com/1029377"
},
{
"category": "self",
"summary": "SUSE Bug 1029902",
"url": "https://bugzilla.suse.com/1029902"
},
{
"category": "self",
"summary": "SUSE Bug 1040164",
"url": "https://bugzilla.suse.com/1040164"
},
{
"category": "self",
"summary": "SUSE Bug 1042670",
"url": "https://bugzilla.suse.com/1042670"
},
{
"category": "self",
"summary": "SUSE Bug 1070853",
"url": "https://bugzilla.suse.com/1070853"
},
{
"category": "self",
"summary": "SUSE Bug 1079761",
"url": "https://bugzilla.suse.com/1079761"
},
{
"category": "self",
"summary": "SUSE Bug 1081750",
"url": "https://bugzilla.suse.com/1081750"
},
{
"category": "self",
"summary": "SUSE Bug 1083507",
"url": "https://bugzilla.suse.com/1083507"
},
{
"category": "self",
"summary": "SUSE Bug 1086001",
"url": "https://bugzilla.suse.com/1086001"
},
{
"category": "self",
"summary": "SUSE Bug 1088004",
"url": "https://bugzilla.suse.com/1088004"
},
{
"category": "self",
"summary": "SUSE Bug 1088009",
"url": "https://bugzilla.suse.com/1088009"
},
{
"category": "self",
"summary": "SUSE Bug 1088573",
"url": "https://bugzilla.suse.com/1088573"
},
{
"category": "self",
"summary": "SUSE Bug 1094814",
"url": "https://bugzilla.suse.com/1094814"
},
{
"category": "self",
"summary": "SUSE Bug 1107030",
"url": "https://bugzilla.suse.com/1107030"
},
{
"category": "self",
"summary": "SUSE Bug 1109663",
"url": "https://bugzilla.suse.com/1109663"
},
{
"category": "self",
"summary": "SUSE Bug 1109847",
"url": "https://bugzilla.suse.com/1109847"
},
{
"category": "self",
"summary": "SUSE Bug 1120644",
"url": "https://bugzilla.suse.com/1120644"
},
{
"category": "self",
"summary": "SUSE Bug 1122191",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "self",
"summary": "SUSE Bug 1129346",
"url": "https://bugzilla.suse.com/1129346"
},
{
"category": "self",
"summary": "SUSE Bug 1130840",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "self",
"summary": "SUSE Bug 1133452",
"url": "https://bugzilla.suse.com/1133452"
},
{
"category": "self",
"summary": "SUSE Bug 1137942",
"url": "https://bugzilla.suse.com/1137942"
},
{
"category": "self",
"summary": "SUSE Bug 1138459",
"url": "https://bugzilla.suse.com/1138459"
},
{
"category": "self",
"summary": "SUSE Bug 1141853",
"url": "https://bugzilla.suse.com/1141853"
},
{
"category": "self",
"summary": "SUSE Bug 1149121",
"url": "https://bugzilla.suse.com/1149121"
},
{
"category": "self",
"summary": "SUSE Bug 1149792",
"url": "https://bugzilla.suse.com/1149792"
},
{
"category": "self",
"summary": "SUSE Bug 1149955",
"url": "https://bugzilla.suse.com/1149955"
},
{
"category": "self",
"summary": "SUSE Bug 1151490",
"url": "https://bugzilla.suse.com/1151490"
},
{
"category": "self",
"summary": "SUSE Bug 1153238",
"url": "https://bugzilla.suse.com/1153238"
},
{
"category": "self",
"summary": "SUSE Bug 1159035",
"url": "https://bugzilla.suse.com/1159035"
},
{
"category": "self",
"summary": "SUSE Bug 1159622",
"url": "https://bugzilla.suse.com/1159622"
},
{
"category": "self",
"summary": "SUSE Bug 637176",
"url": "https://bugzilla.suse.com/637176"
},
{
"category": "self",
"summary": "SUSE Bug 658604",
"url": "https://bugzilla.suse.com/658604"
},
{
"category": "self",
"summary": "SUSE Bug 673071",
"url": "https://bugzilla.suse.com/673071"
},
{
"category": "self",
"summary": "SUSE Bug 709442",
"url": "https://bugzilla.suse.com/709442"
},
{
"category": "self",
"summary": "SUSE Bug 743787",
"url": "https://bugzilla.suse.com/743787"
},
{
"category": "self",
"summary": "SUSE Bug 747125",
"url": "https://bugzilla.suse.com/747125"
},
{
"category": "self",
"summary": "SUSE Bug 751718",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "self",
"summary": "SUSE Bug 754447",
"url": "https://bugzilla.suse.com/754447"
},
{
"category": "self",
"summary": "SUSE Bug 754677",
"url": "https://bugzilla.suse.com/754677"
},
{
"category": "self",
"summary": "SUSE Bug 787526",
"url": "https://bugzilla.suse.com/787526"
},
{
"category": "self",
"summary": "SUSE Bug 809831",
"url": "https://bugzilla.suse.com/809831"
},
{
"category": "self",
"summary": "SUSE Bug 831629",
"url": "https://bugzilla.suse.com/831629"
},
{
"category": "self",
"summary": "SUSE Bug 834601",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "self",
"summary": "SUSE Bug 871152",
"url": "https://bugzilla.suse.com/871152"
},
{
"category": "self",
"summary": "SUSE Bug 885662",
"url": "https://bugzilla.suse.com/885662"
},
{
"category": "self",
"summary": "SUSE Bug 885882",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "self",
"summary": "SUSE Bug 917607",
"url": "https://bugzilla.suse.com/917607"
},
{
"category": "self",
"summary": "SUSE Bug 942751",
"url": "https://bugzilla.suse.com/942751"
},
{
"category": "self",
"summary": "SUSE Bug 951166",
"url": "https://bugzilla.suse.com/951166"
},
{
"category": "self",
"summary": "SUSE Bug 983582",
"url": "https://bugzilla.suse.com/983582"
},
{
"category": "self",
"summary": "SUSE Bug 984751",
"url": "https://bugzilla.suse.com/984751"
},
{
"category": "self",
"summary": "SUSE Bug 985177",
"url": "https://bugzilla.suse.com/985177"
},
{
"category": "self",
"summary": "SUSE Bug 985348",
"url": "https://bugzilla.suse.com/985348"
},
{
"category": "self",
"summary": "SUSE Bug 989523",
"url": "https://bugzilla.suse.com/989523"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0772 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000110 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5636 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5699 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5699/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18207 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000802 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000802/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1060 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1061 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14647 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20406 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20406/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20852 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10160 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15903 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16935 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16935/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9636 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
}
],
"title": "Security update for python3",
"tracking": {
"current_release_date": "2020-01-16T09:12:11Z",
"generator": {
"date": "2020-01-16T09:12:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:0114-1",
"initial_release_date": "2020-01-16T09:12:11Z",
"revision_history": [
{
"date": "2020-01-16T09:12:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"product": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"product_id": "libpython3_6m1_0-3.6.10-3.42.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-3.6.10-3.42.2.aarch64",
"product": {
"name": "python3-3.6.10-3.42.2.aarch64",
"product_id": "python3-3.6.10-3.42.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.10-3.42.2.aarch64",
"product": {
"name": "python3-base-3.6.10-3.42.2.aarch64",
"product_id": "python3-base-3.6.10-3.42.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.10-3.42.2.aarch64",
"product": {
"name": "python3-curses-3.6.10-3.42.2.aarch64",
"product_id": "python3-curses-3.6.10-3.42.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.10-3.42.2.aarch64",
"product": {
"name": "python3-dbm-3.6.10-3.42.2.aarch64",
"product_id": "python3-dbm-3.6.10-3.42.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.10-3.42.2.aarch64",
"product": {
"name": "python3-devel-3.6.10-3.42.2.aarch64",
"product_id": "python3-devel-3.6.10-3.42.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.10-3.42.2.aarch64",
"product": {
"name": "python3-idle-3.6.10-3.42.2.aarch64",
"product_id": "python3-idle-3.6.10-3.42.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.10-3.42.2.aarch64",
"product": {
"name": "python3-testsuite-3.6.10-3.42.2.aarch64",
"product_id": "python3-testsuite-3.6.10-3.42.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.10-3.42.2.aarch64",
"product": {
"name": "python3-tk-3.6.10-3.42.2.aarch64",
"product_id": "python3-tk-3.6.10-3.42.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.10-3.42.2.aarch64",
"product": {
"name": "python3-tools-3.6.10-3.42.2.aarch64",
"product_id": "python3-tools-3.6.10-3.42.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-64bit-3.6.10-3.42.2.aarch64_ilp32",
"product": {
"name": "libpython3_6m1_0-64bit-3.6.10-3.42.2.aarch64_ilp32",
"product_id": "libpython3_6m1_0-64bit-3.6.10-3.42.2.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python3-64bit-3.6.10-3.42.2.aarch64_ilp32",
"product": {
"name": "python3-64bit-3.6.10-3.42.2.aarch64_ilp32",
"product_id": "python3-64bit-3.6.10-3.42.2.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python3-base-64bit-3.6.10-3.42.2.aarch64_ilp32",
"product": {
"name": "python3-base-64bit-3.6.10-3.42.2.aarch64_ilp32",
"product_id": "python3-base-64bit-3.6.10-3.42.2.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.10-3.42.2.i586",
"product": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.i586",
"product_id": "libpython3_6m1_0-3.6.10-3.42.2.i586"
}
},
{
"category": "product_version",
"name": "python3-3.6.10-3.42.2.i586",
"product": {
"name": "python3-3.6.10-3.42.2.i586",
"product_id": "python3-3.6.10-3.42.2.i586"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.10-3.42.2.i586",
"product": {
"name": "python3-base-3.6.10-3.42.2.i586",
"product_id": "python3-base-3.6.10-3.42.2.i586"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.10-3.42.2.i586",
"product": {
"name": "python3-curses-3.6.10-3.42.2.i586",
"product_id": "python3-curses-3.6.10-3.42.2.i586"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.10-3.42.2.i586",
"product": {
"name": "python3-dbm-3.6.10-3.42.2.i586",
"product_id": "python3-dbm-3.6.10-3.42.2.i586"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.10-3.42.2.i586",
"product": {
"name": "python3-devel-3.6.10-3.42.2.i586",
"product_id": "python3-devel-3.6.10-3.42.2.i586"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.10-3.42.2.i586",
"product": {
"name": "python3-idle-3.6.10-3.42.2.i586",
"product_id": "python3-idle-3.6.10-3.42.2.i586"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.10-3.42.2.i586",
"product": {
"name": "python3-testsuite-3.6.10-3.42.2.i586",
"product_id": "python3-testsuite-3.6.10-3.42.2.i586"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.10-3.42.2.i586",
"product": {
"name": "python3-tk-3.6.10-3.42.2.i586",
"product_id": "python3-tk-3.6.10-3.42.2.i586"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.10-3.42.2.i586",
"product": {
"name": "python3-tools-3.6.10-3.42.2.i586",
"product_id": "python3-tools-3.6.10-3.42.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-doc-3.6.10-3.42.3.noarch",
"product": {
"name": "python3-doc-3.6.10-3.42.3.noarch",
"product_id": "python3-doc-3.6.10-3.42.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"product": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"product_id": "libpython3_6m1_0-3.6.10-3.42.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-3.6.10-3.42.2.ppc64le",
"product": {
"name": "python3-3.6.10-3.42.2.ppc64le",
"product_id": "python3-3.6.10-3.42.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.10-3.42.2.ppc64le",
"product": {
"name": "python3-base-3.6.10-3.42.2.ppc64le",
"product_id": "python3-base-3.6.10-3.42.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.10-3.42.2.ppc64le",
"product": {
"name": "python3-curses-3.6.10-3.42.2.ppc64le",
"product_id": "python3-curses-3.6.10-3.42.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.10-3.42.2.ppc64le",
"product": {
"name": "python3-dbm-3.6.10-3.42.2.ppc64le",
"product_id": "python3-dbm-3.6.10-3.42.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.10-3.42.2.ppc64le",
"product": {
"name": "python3-devel-3.6.10-3.42.2.ppc64le",
"product_id": "python3-devel-3.6.10-3.42.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.10-3.42.2.ppc64le",
"product": {
"name": "python3-idle-3.6.10-3.42.2.ppc64le",
"product_id": "python3-idle-3.6.10-3.42.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.10-3.42.2.ppc64le",
"product": {
"name": "python3-testsuite-3.6.10-3.42.2.ppc64le",
"product_id": "python3-testsuite-3.6.10-3.42.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.10-3.42.2.ppc64le",
"product": {
"name": "python3-tk-3.6.10-3.42.2.ppc64le",
"product_id": "python3-tk-3.6.10-3.42.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.10-3.42.2.ppc64le",
"product": {
"name": "python3-tools-3.6.10-3.42.2.ppc64le",
"product_id": "python3-tools-3.6.10-3.42.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.10-3.42.2.s390x",
"product": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.s390x",
"product_id": "libpython3_6m1_0-3.6.10-3.42.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-3.6.10-3.42.2.s390x",
"product": {
"name": "python3-3.6.10-3.42.2.s390x",
"product_id": "python3-3.6.10-3.42.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.10-3.42.2.s390x",
"product": {
"name": "python3-base-3.6.10-3.42.2.s390x",
"product_id": "python3-base-3.6.10-3.42.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.10-3.42.2.s390x",
"product": {
"name": "python3-curses-3.6.10-3.42.2.s390x",
"product_id": "python3-curses-3.6.10-3.42.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.10-3.42.2.s390x",
"product": {
"name": "python3-dbm-3.6.10-3.42.2.s390x",
"product_id": "python3-dbm-3.6.10-3.42.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.10-3.42.2.s390x",
"product": {
"name": "python3-devel-3.6.10-3.42.2.s390x",
"product_id": "python3-devel-3.6.10-3.42.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.10-3.42.2.s390x",
"product": {
"name": "python3-idle-3.6.10-3.42.2.s390x",
"product_id": "python3-idle-3.6.10-3.42.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.10-3.42.2.s390x",
"product": {
"name": "python3-testsuite-3.6.10-3.42.2.s390x",
"product_id": "python3-testsuite-3.6.10-3.42.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.10-3.42.2.s390x",
"product": {
"name": "python3-tk-3.6.10-3.42.2.s390x",
"product_id": "python3-tk-3.6.10-3.42.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.10-3.42.2.s390x",
"product": {
"name": "python3-tools-3.6.10-3.42.2.s390x",
"product_id": "python3-tools-3.6.10-3.42.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"product": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"product_id": "libpython3_6m1_0-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_6m1_0-32bit-3.6.10-3.42.2.x86_64",
"product": {
"name": "libpython3_6m1_0-32bit-3.6.10-3.42.2.x86_64",
"product_id": "libpython3_6m1_0-32bit-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-3.6.10-3.42.2.x86_64",
"product": {
"name": "python3-3.6.10-3.42.2.x86_64",
"product_id": "python3-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-32bit-3.6.10-3.42.2.x86_64",
"product": {
"name": "python3-32bit-3.6.10-3.42.2.x86_64",
"product_id": "python3-32bit-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.10-3.42.2.x86_64",
"product": {
"name": "python3-base-3.6.10-3.42.2.x86_64",
"product_id": "python3-base-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-base-32bit-3.6.10-3.42.2.x86_64",
"product": {
"name": "python3-base-32bit-3.6.10-3.42.2.x86_64",
"product_id": "python3-base-32bit-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.10-3.42.2.x86_64",
"product": {
"name": "python3-curses-3.6.10-3.42.2.x86_64",
"product_id": "python3-curses-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.10-3.42.2.x86_64",
"product": {
"name": "python3-dbm-3.6.10-3.42.2.x86_64",
"product_id": "python3-dbm-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.10-3.42.2.x86_64",
"product": {
"name": "python3-devel-3.6.10-3.42.2.x86_64",
"product_id": "python3-devel-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.10-3.42.2.x86_64",
"product": {
"name": "python3-idle-3.6.10-3.42.2.x86_64",
"product_id": "python3-idle-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.10-3.42.2.x86_64",
"product": {
"name": "python3-testsuite-3.6.10-3.42.2.x86_64",
"product_id": "python3-testsuite-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.10-3.42.2.x86_64",
"product": {
"name": "python3-tk-3.6.10-3.42.2.x86_64",
"product_id": "python3-tk-3.6.10-3.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.10-3.42.2.x86_64",
"product": {
"name": "python3-tools-3.6.10-3.42.2.x86_64",
"product_id": "python3-tools-3.6.10-3.42.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-base-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-base-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-base-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-base-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-curses-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-curses-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-curses-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-curses-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-dbm-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-dbm-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-dbm-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-dbm-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-devel-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-devel-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-devel-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-devel-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-idle-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-idle-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-idle-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-idle-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-tk-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-tk-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-tk-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-tk-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-base-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-base-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-base-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-base-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-curses-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-curses-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-curses-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-curses-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-dbm-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-dbm-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-dbm-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-dbm-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-devel-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-devel-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-devel-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-devel-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-idle-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-idle-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-idle-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-idle-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-tk-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-tk-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-tk-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-tk-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-tools-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-tools-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-tools-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-tools-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.10-3.42.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64"
},
"product_reference": "python3-tools-3.6.10-3.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.10-3.42.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le"
},
"product_reference": "python3-tools-3.6.10-3.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.10-3.42.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x"
},
"product_reference": "python3-tools-3.6.10-3.42.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.10-3.42.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64"
},
"product_reference": "python3-tools-3.6.10-3.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2016-0772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0772"
}
],
"notes": [
{
"category": "general",
"text": "The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a \"StartTLS stripping attack.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0772",
"url": "https://www.suse.com/security/cve/CVE-2016-0772"
},
{
"category": "external",
"summary": "SUSE Bug 984751 for CVE-2016-0772",
"url": "https://bugzilla.suse.com/984751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2016-0772"
},
{
"cve": "CVE-2016-1000110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000110"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000110",
"url": "https://www.suse.com/security/cve/CVE-2016-1000110"
},
{
"category": "external",
"summary": "SUSE Bug 988484 for CVE-2016-1000110",
"url": "https://bugzilla.suse.com/988484"
},
{
"category": "external",
"summary": "SUSE Bug 989523 for CVE-2016-1000110",
"url": "https://bugzilla.suse.com/989523"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2016-1000110"
},
{
"cve": "CVE-2016-5636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5636"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5636",
"url": "https://www.suse.com/security/cve/CVE-2016-5636"
},
{
"category": "external",
"summary": "SUSE Bug 1065451 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/1065451"
},
{
"category": "external",
"summary": "SUSE Bug 1106262 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/1106262"
},
{
"category": "external",
"summary": "SUSE Bug 985177 for CVE-2016-5636",
"url": "https://bugzilla.suse.com/985177"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "important"
}
],
"title": "CVE-2016-5636"
},
{
"cve": "CVE-2016-5699",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5699"
}
],
"notes": [
{
"category": "general",
"text": "CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5699",
"url": "https://www.suse.com/security/cve/CVE-2016-5699"
},
{
"category": "external",
"summary": "SUSE Bug 1122729 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/1122729"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 985348 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/985348"
},
{
"category": "external",
"summary": "SUSE Bug 985351 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/985351"
},
{
"category": "external",
"summary": "SUSE Bug 986630 for CVE-2016-5699",
"url": "https://bugzilla.suse.com/986630"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2016-5699"
},
{
"cve": "CVE-2017-18207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18207"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18207",
"url": "https://www.suse.com/security/cve/CVE-2017-18207"
},
{
"category": "external",
"summary": "SUSE Bug 1083507 for CVE-2017-18207",
"url": "https://bugzilla.suse.com/1083507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2017-18207"
},
{
"cve": "CVE-2018-1000802",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000802"
}
],
"notes": [
{
"category": "general",
"text": "Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000802",
"url": "https://www.suse.com/security/cve/CVE-2018-1000802"
},
{
"category": "external",
"summary": "SUSE Bug 1109663 for CVE-2018-1000802",
"url": "https://bugzilla.suse.com/1109663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000802"
},
{
"cve": "CVE-2018-1060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1060"
}
],
"notes": [
{
"category": "general",
"text": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib\u0027s apop() method. An attacker could use this flaw to cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1060",
"url": "https://www.suse.com/security/cve/CVE-2018-1060"
},
{
"category": "external",
"summary": "SUSE Bug 1088009 for CVE-2018-1060",
"url": "https://bugzilla.suse.com/1088009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "low"
}
],
"title": "CVE-2018-1060"
},
{
"cve": "CVE-2018-1061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1061"
}
],
"notes": [
{
"category": "general",
"text": "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1061",
"url": "https://www.suse.com/security/cve/CVE-2018-1061"
},
{
"category": "external",
"summary": "SUSE Bug 1088004 for CVE-2018-1061",
"url": "https://bugzilla.suse.com/1088004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2018-1061"
},
{
"cve": "CVE-2018-14647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14647"
}
],
"notes": [
{
"category": "general",
"text": "Python\u0027s elementtree C accelerator failed to initialise Expat\u0027s hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat\u0027s internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14647",
"url": "https://www.suse.com/security/cve/CVE-2018-14647"
},
{
"category": "external",
"summary": "SUSE Bug 1109847 for CVE-2018-14647",
"url": "https://bugzilla.suse.com/1109847"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2018-14647",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2018-14647"
},
{
"cve": "CVE-2018-20406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20406"
}
],
"notes": [
{
"category": "general",
"text": "Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a \"resize to twice the size\" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20406",
"url": "https://www.suse.com/security/cve/CVE-2018-20406"
},
{
"category": "external",
"summary": "SUSE Bug 1120644 for CVE-2018-20406",
"url": "https://bugzilla.suse.com/1120644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "low"
}
],
"title": "CVE-2018-20406"
},
{
"cve": "CVE-2018-20852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20852"
}
],
"notes": [
{
"category": "general",
"text": "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20852",
"url": "https://www.suse.com/security/cve/CVE-2018-20852"
},
{
"category": "external",
"summary": "SUSE Bug 1141853 for CVE-2018-20852",
"url": "https://bugzilla.suse.com/1141853"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2018-20852"
},
{
"cve": "CVE-2019-10160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10160"
}
],
"notes": [
{
"category": "general",
"text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10160",
"url": "https://www.suse.com/security/cve/CVE-2019-10160"
},
{
"category": "external",
"summary": "SUSE Bug 1138459 for CVE-2019-10160",
"url": "https://bugzilla.suse.com/1138459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "critical"
}
],
"title": "CVE-2019-10160"
},
{
"cve": "CVE-2019-15903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15903"
}
],
"notes": [
{
"category": "general",
"text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15903",
"url": "https://www.suse.com/security/cve/CVE-2019-15903"
},
{
"category": "external",
"summary": "SUSE Bug 1149429 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1149429"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1154738"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "important"
}
],
"title": "CVE-2019-15903"
},
{
"cve": "CVE-2019-16056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16056"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16056",
"url": "https://www.suse.com/security/cve/CVE-2019-16056"
},
{
"category": "external",
"summary": "SUSE Bug 1149955 for CVE-2019-16056",
"url": "https://bugzilla.suse.com/1149955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2019-16056"
},
{
"cve": "CVE-2019-16935",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16935"
}
],
"notes": [
{
"category": "general",
"text": "The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16935",
"url": "https://www.suse.com/security/cve/CVE-2019-16935"
},
{
"category": "external",
"summary": "SUSE Bug 1153238 for CVE-2019-16935",
"url": "https://bugzilla.suse.com/1153238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2019-16935"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "important"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9636"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9636",
"url": "https://www.suse.com/security/cve/CVE-2019-9636"
},
{
"category": "external",
"summary": "SUSE Bug 1129346 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1129346"
},
{
"category": "external",
"summary": "SUSE Bug 1135433 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1135433"
},
{
"category": "external",
"summary": "SUSE Bug 1138459 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1138459"
},
{
"category": "external",
"summary": "SUSE Bug 1145004 for CVE-2019-9636",
"url": "https://bugzilla.suse.com/1145004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "important"
}
],
"title": "CVE-2019-9636"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libpython3_6m1_0-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-base-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-curses-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-dbm-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-devel-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-idle-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:python3-tk-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:python3-tools-3.6.10-3.42.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:python3-tools-3.6.10-3.42.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-16T09:12:11Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
}
]
}
fkie_cve-2011-3389
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/ | Third Party Advisory | |
| cve@mitre.org | http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx | Third Party Advisory | |
| cve@mitre.org | http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx | Third Party Advisory | |
| cve@mitre.org | http://curl.haxx.se/docs/adv_20120124B.html | Third Party Advisory | |
| cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2016-001.html | Third Party Advisory | |
| cve@mitre.org | http://ekoparty.org/2011/juliano-rizzo.php | Broken Link | |
| cve@mitre.org | http://eprint.iacr.org/2004/111 | Third Party Advisory | |
| cve@mitre.org | http://eprint.iacr.org/2006/136 | Third Party Advisory | |
| cve@mitre.org | http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html | Not Applicable, Vendor Advisory | |
| cve@mitre.org | http://isc.sans.edu/diary/SSL+TLS+part+3+/11635 | Third Party Advisory | |
| cve@mitre.org | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html | Broken Link | |
| cve@mitre.org | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html | Broken Link | |
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html | Broken Link, Mailing List | |
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html | Broken Link, Mailing List | |
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2012/May/msg00001.html | Broken Link, Mailing List | |
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html | Broken Link, Mailing List | |
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html | Broken Link, Mailing List | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html | Broken Link | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html | Broken Link | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html | Broken Link | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html | Broken Link | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=132750579901589&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=132750579901589&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=132872385320240&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=132872385320240&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=133365109612558&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=133365109612558&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=133728004526190&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=133728004526190&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=134254866602253&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=134254957702612&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=134254957702612&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue | Third Party Advisory | |
| cve@mitre.org | http://osvdb.org/74829 | Broken Link | |
| cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2012-0508.html | Third Party Advisory | |
| cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2013-1455.html | Broken Link | |
| cve@mitre.org | http://secunia.com/advisories/45791 | Not Applicable | |
| cve@mitre.org | http://secunia.com/advisories/47998 | Not Applicable | |
| cve@mitre.org | http://secunia.com/advisories/48256 | Not Applicable | |
| cve@mitre.org | http://secunia.com/advisories/48692 | Not Applicable | |
| cve@mitre.org | http://secunia.com/advisories/48915 | Not Applicable | |
| cve@mitre.org | http://secunia.com/advisories/48948 | Not Applicable | |
| cve@mitre.org | http://secunia.com/advisories/49198 | Not Applicable | |
| cve@mitre.org | http://secunia.com/advisories/55322 | Not Applicable | |
| cve@mitre.org | http://secunia.com/advisories/55350 | Not Applicable | |
| cve@mitre.org | http://secunia.com/advisories/55351 | Not Applicable | |
| cve@mitre.org | http://security.gentoo.org/glsa/glsa-201203-02.xml | Third Party Advisory | |
| cve@mitre.org | http://security.gentoo.org/glsa/glsa-201406-32.xml | Third Party Advisory | |
| cve@mitre.org | http://support.apple.com/kb/HT4999 | Third Party Advisory | |
| cve@mitre.org | http://support.apple.com/kb/HT5001 | Third Party Advisory | |
| cve@mitre.org | http://support.apple.com/kb/HT5130 | Third Party Advisory | |
| cve@mitre.org | http://support.apple.com/kb/HT5281 | Broken Link | |
| cve@mitre.org | http://support.apple.com/kb/HT5501 | Third Party Advisory | |
| cve@mitre.org | http://support.apple.com/kb/HT6150 | Third Party Advisory | |
| cve@mitre.org | http://technet.microsoft.com/security/advisory/2588513 | Patch, Vendor Advisory | |
| cve@mitre.org | http://vnhacker.blogspot.com/2011/09/beast.html | Third Party Advisory | |
| cve@mitre.org | http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf | Third Party Advisory | |
| cve@mitre.org | http://www.debian.org/security/2012/dsa-2398 | Third Party Advisory | |
| cve@mitre.org | http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html | Broken Link | |
| cve@mitre.org | http://www.ibm.com/developerworks/java/jdk/alerts/ | Third Party Advisory | |
| cve@mitre.org | http://www.imperialviolet.org/2011/09/23/chromeandbeast.html | Third Party Advisory | |
| cve@mitre.org | http://www.insecure.cl/Beast-SSL.rar | Broken Link, Patch | |
| cve@mitre.org | http://www.kb.cert.org/vuls/id/864643 | Third Party Advisory, US Government Resource | |
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2012:058 | Broken Link | |
| cve@mitre.org | http://www.opera.com/docs/changelogs/mac/1151/ | Third Party Advisory | |
| cve@mitre.org | http://www.opera.com/docs/changelogs/mac/1160/ | Third Party Advisory | |
| cve@mitre.org | http://www.opera.com/docs/changelogs/unix/1151/ | Third Party Advisory | |
| cve@mitre.org | http://www.opera.com/docs/changelogs/unix/1160/ | Third Party Advisory | |
| cve@mitre.org | http://www.opera.com/docs/changelogs/windows/1151/ | Third Party Advisory | |
| cve@mitre.org | http://www.opera.com/docs/changelogs/windows/1160/ | Third Party Advisory | |
| cve@mitre.org | http://www.opera.com/support/kb/view/1004/ | Third Party Advisory, Vendor Advisory | |
| cve@mitre.org | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | Third Party Advisory | |
| cve@mitre.org | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | Third Party Advisory | |
| cve@mitre.org | http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html | Third Party Advisory | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2011-1384.html | Third Party Advisory, Vendor Advisory | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2012-0006.html | Third Party Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/49388 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securityfocus.com/bid/49778 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securitytracker.com/id/1029190 | Broken Link, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securitytracker.com/id?1025997 | Broken Link, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securitytracker.com/id?1026103 | Broken Link, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securitytracker.com/id?1026704 | Broken Link, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.ubuntu.com/usn/USN-1263-1 | Third Party Advisory | |
| cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA12-010A.html | Third Party Advisory, US Government Resource | |
| cve@mitre.org | https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail | Third Party Advisory | |
| cve@mitre.org | https://bugzilla.novell.com/show_bug.cgi?id=719047 | Issue Tracking, Third Party Advisory | |
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=737506 | Issue Tracking, Third Party Advisory | |
| cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf | Third Party Advisory | |
| cve@mitre.org | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006 | Patch, Vendor Advisory | |
| cve@mitre.org | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862 | Broken Link | |
| cve@mitre.org | https://hermes.opensuse.org/messages/13154861 | Broken Link | |
| cve@mitre.org | https://hermes.opensuse.org/messages/13155432 | Broken Link | |
| cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 | Third Party Advisory, US Government Resource | |
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://curl.haxx.se/docs/adv_20120124B.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2016-001.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://ekoparty.org/2011/juliano-rizzo.php | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://eprint.iacr.org/2004/111 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://eprint.iacr.org/2006/136 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html | Not Applicable, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://isc.sans.edu/diary/SSL+TLS+part+3+/11635 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html | Broken Link, Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html | Broken Link, Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/May/msg00001.html | Broken Link, Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html | Broken Link, Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html | Broken Link, Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=132750579901589&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=132750579901589&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=132872385320240&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=132872385320240&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=133365109612558&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=133365109612558&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=133728004526190&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=133728004526190&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=134254866602253&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=134254957702612&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=134254957702612&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/74829 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2012-0508.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1455.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/45791 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/47998 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48256 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48692 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48915 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48948 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49198 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/55322 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/55350 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/55351 | Not Applicable | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201203-02.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-32.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT4999 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5001 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5130 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5281 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5501 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT6150 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://technet.microsoft.com/security/advisory/2588513 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://vnhacker.blogspot.com/2011/09/beast.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2012/dsa-2398 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/developerworks/java/jdk/alerts/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.imperialviolet.org/2011/09/23/chromeandbeast.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.insecure.cl/Beast-SSL.rar | Broken Link, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/864643 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2012:058 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.opera.com/docs/changelogs/mac/1151/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.opera.com/docs/changelogs/mac/1160/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.opera.com/docs/changelogs/unix/1151/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.opera.com/docs/changelogs/unix/1160/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.opera.com/docs/changelogs/windows/1151/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.opera.com/docs/changelogs/windows/1160/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.opera.com/support/kb/view/1004/ | Third Party Advisory, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-1384.html | Third Party Advisory, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2012-0006.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/49388 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/49778 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1029190 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025997 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1026103 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1026704 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1263-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA12-010A.html | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.novell.com/show_bug.cgi?id=719047 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=737506 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://hermes.opensuse.org/messages/13154861 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://hermes.opensuse.org/messages/13155432 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| chrome | - | ||
| microsoft | internet_explorer | - | |
| mozilla | firefox | - | |
| opera | opera_browser | - | |
| microsoft | windows | - | |
| siemens | simatic_rf68xr_firmware | * | |
| siemens | simatic_rf68xr | - | |
| siemens | simatic_rf615r_firmware | * | |
| siemens | simatic_rf615r | - | |
| haxx | curl | * | |
| redhat | enterprise_linux_desktop | 5.0 | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_eus | 6.2 | |
| redhat | enterprise_linux_server | 5.0 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_server_aus | 6.2 | |
| redhat | enterprise_linux_workstation | 5.0 | |
| redhat | enterprise_linux_workstation | 6.0 | |
| debian | debian_linux | 5.0 | |
| debian | debian_linux | 6.0 | |
| canonical | ubuntu_linux | 10.04 | |
| canonical | ubuntu_linux | 10.10 | |
| canonical | ubuntu_linux | 11.04 | |
| canonical | ubuntu_linux | 11.10 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39B565E1-C2F1-44FC-A517-E3130332B17C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C37BA825-679F-4257-9F2B-CE2318B75396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97D4FFCF-5309-43B6-9FD5-680C6D535A7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4545786D-3129-4D92-B218-F4A92428ED48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_rf68xr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "416A895C-F973-4C13-AB9B-32D56B32C14B",
"versionEndExcluding": "3.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_rf68xr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB562D2A-9B77-42DD-A49B-F5E909E69589",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_rf615r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46F9E136-5346-4761-A60B-1A1F12DD75BB",
"versionEndExcluding": "3.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_rf615r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2310C8A4-DFE4-44E4-B840-2FF1744F785D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5320D044-368E-450B-B658-E861ABECA82C",
"versionEndIncluding": "7.23.1",
"versionStartIncluding": "7.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C0554C89-3716-49F3-BFAE-E008D5E4E29C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6D0378-F0F4-4AAA-80AF-8287C790EC96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
"matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack."
},
{
"lang": "es",
"value": "El protocolo SSL, como se utiliza en ciertas configuraciones en Microsoft Windows y Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera y otros productos, cifra los datos mediante el uso del modo CBC con vectores de inicializaci\u00f3n encadenados, lo que permite a atacantes man-in-the-middle obtener cabeceras HTTP en texto plano a trav\u00e9s de un ataque blockwise chosen-boundary (BCBA) en una sesi\u00f3n HTTPS, junto con el c\u00f3digo de JavaScript que usa (1) la API WebSocket HTML5, (2) la API Java URLConnection o (3) la API Silverlight WebClient, tambi\u00e9n conocido como un ataque \"BEAST\"."
}
],
"id": "CVE-2011-3389",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-09-06T19:55:03.197",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20120124B.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://ekoparty.org/2011/juliano-rizzo.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://eprint.iacr.org/2004/111"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://eprint.iacr.org/2006/136"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/74829"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/45791"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/47998"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48256"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48692"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48915"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48948"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/49198"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/55322"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/55350"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/55351"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT4999"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5001"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5130"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://support.apple.com/kb/HT5281"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5501"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT6150"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://technet.microsoft.com/security/advisory/2588513"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://vnhacker.blogspot.com/2011/09/beast.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2012/dsa-2398"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch"
],
"url": "http://www.insecure.cl/Beast-SSL.rar"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/864643"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/mac/1151/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/mac/1160/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/unix/1151/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/unix/1160/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/windows/1151/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/windows/1160/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "http://www.opera.com/support/kb/view/1004/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/49388"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/49778"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1029190"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1025997"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1026103"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1026704"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1263-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=719047"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://hermes.opensuse.org/messages/13154861"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://hermes.opensuse.org/messages/13155432"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20120124B.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://ekoparty.org/2011/juliano-rizzo.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://eprint.iacr.org/2004/111"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://eprint.iacr.org/2006/136"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/74829"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/45791"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/47998"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48256"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48692"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48915"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/48948"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/49198"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/55322"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/55350"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://secunia.com/advisories/55351"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201203-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT4999"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5130"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://support.apple.com/kb/HT5281"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5501"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT6150"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://technet.microsoft.com/security/advisory/2588513"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://vnhacker.blogspot.com/2011/09/beast.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2012/dsa-2398"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Patch"
],
"url": "http://www.insecure.cl/Beast-SSL.rar"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/864643"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/mac/1151/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/mac/1160/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/unix/1151/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/unix/1160/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/windows/1151/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.opera.com/docs/changelogs/windows/1160/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "http://www.opera.com/support/kb/view/1004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/49388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/49778"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1029190"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1025997"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1026103"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1026704"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1263-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=719047"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://hermes.opensuse.org/messages/13154861"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://hermes.opensuse.org/messages/13155432"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-326"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.